When using CHKDSK, which of the following parameters locks the volume, locates bad sectorsand recovers readable information?()A、/rB、/fC、/iD、/x

When using CHKDSK, which of the following parameters locks the volume, locates bad sectorsand recovers readable information?()

  • A、/r
  • B、/f
  • C、/i
  • D、/x

相关考题:

Which two scenarios are NOT safe to replace a StringBuffer object with a StringBuilder object?() A.When using versions of Java technology earlier than 5.0.B.When sharing a StringBuffer among multiple threads.C.When using the java.io class StringBufferInputStream.D.When you plan to reuse the StringBuffer to build more than one string.

A user, Jill, is reporting her mouse is moving when Jill is not moving it, and the computer is running slower than normal. Which of the following is the FIRST action that Karen, a technician, should take?()A. Run chkdsk.B. Run an antivirus program.C. Replace the faulty mouse.D. Remove any recently added hardware.

Which statement concerning the lashings of containers with solid bar or wire rope lashings is TRUE ________.A.Stack weights should be less when using a solid bar lashing as compared to a wire lashingB.Stack heights may be increased when using a solid bar lashingC.Stack heights should be reduced when using a solid bar lashingD.Solid bars should be used for lashing the first tier only,with wire lashings on the higher tier(s)

When you are designing a Web application, which options define how rich text displays in a browser?()A、"Using HTML"B、"Using Java Applet"C、"Using AJAX Control"D、"Using Best Fit for OS"

In the wireless Advanced Feature Set using lightweight access points, a virtual interface is used when supporting which of the following features?()A、PSK authenticationB、EAP authenticationC、WPA authenticationD、Web authentication

Two Company switches are connected via a trunk using VTP. Which VTP information does a  Catalyst switch advertise on its trunk ports when using VTP?()A、STP root statusB、VTP modeC、Negotiation statusD、Management domainE、Configuration revision number

When using Device Manager, a red ‘X” indicates which of the following?()A、Device is disabledB、Device conflictC、No device driver foundD、Device has not been digitally signed

A user, Jill, is reporting her mouse is moving when Jill is not moving it, and the computer is running slower than normal. Which of the following is the FIRST action that Karen, a technician, should take?()A、Run chkdsk.B、Run an antivirus program.C、Replace the faulty mouse.D、Remove any recently added hardware.

Which of the following commands would be used to verify the integrity of critical system files?()A、verifyB、nslookupC、sfcD、chkdsk

Which of the following is eliminated when using SATA instead of PATA technology?()A、Jumper selectionB、Power connectorC、Data port connectorD、Hard drive LEDs

Which of the following would BEST optimize a computer that is heavily used? ()A、ScandiskB、DefragC、IndexingD、Chkdsk

When defining resources for a concurrent resource group, which of the following is NOT  supported?()   A、 Application Servers using diskB、 Definition of Multiple IP aliasesC、 Volume Groups using raw logical volumesD、 Volume Groups supporting concurrent access

Which of the following menus are available when a user with the Seller role is using WebSphere Commerce Accelerator to manage a B2C store?()A、LogisticsB、MerchandiseC、OperationsD、ProductsE、Sales

Which two scenarios are NOT safe to replace a StringBuffer object with a StringBuilder object?()A、When using versions of Java technology earlier than 5.0.B、When sharing a StringBuffer among multiple threads.C、When using the java.io class StringBufferInputStream.D、When you plan to reuse the StringBuffer to build more than one string.

In which situation would you use static database registration for a listener()A、when multiple databases are to be registered with the listenerB、when DBAs need to connect remotely to start up the database instanceC、when users need to connect the database instance using the host naming methodD、when the database instance that is to be registered with the listener is configured in shared server mode

In which situation would you use the Oracle Shared Server configuration?()A、when performing export and import using Oracle Data PumpB、when performing backup and recovery operations using Oracle Recovery ManagerC、when performing batch processing and bulk loading operation in a data warehouse environment D、in an online transaction processing (OLTP) system where large number of client sessions are idle most of the time

单选题A user has discovered that even though they are using the latest version of the anti-virus software,the computer is still being infected by a virus. Which of the following is the BEST solution for this problem?()AReplace the computer.BRun chkdsk /f.CUpdate the virus signatures.DRun scandisk.

单选题When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?()AsnoopBtcpdumpCmonitorDtail

单选题Which statement concerning the lashings of containers with solid bar or wire rope lashings is TRUE? ()AStack weights should be less when using a solid bar lashing as compared to a wire lashingBStack heights may be increased when using a solid bar lashingCStack heights should be reduced when using a solid bar lashingDSolid bars should be used for lashing the first tier only,with wire lashings on the higher tier(s)

多选题Two Company switches are connected via a trunk using VTP. Which VTP information does a  Catalyst switch advertise on its trunk ports when using VTP?()ASTP root statusBVTP modeCNegotiation statusDManagement domainEConfiguration revision number

单选题When using CHKDSK, which of the following parameters locks the volume, locates bad sectorsand recovers readable information?()A/rB/fC/iD/x

多选题Which of the following menus are available when a user with the Seller role is using WebSphere Commerce Accelerator to manage a B2C store?()ALogisticsBMerchandiseCOperationsDProductsESales

单选题When defining resources for a concurrent resource group, which of the following is NOT  supported?()A Application Servers using diskB Definition of Multiple IP aliasesC Volume Groups using raw logical volumesD Volume Groups supporting concurrent access

单选题In a Junos Pulse Access Control Service active/active clustered environment, which statement is true about VIPs?()AVIP is not required when using only agentless access for all endpoint platforms.BVIP is not required when using Junos Pulse or Odyssey Access Client for all endpoint platforms.CVIP is not required when using Junos Pulse and agentless access for all endpoint platforms.DVIP is not required when using Odyssey Access Client and agentless access for all endpoint platforms.