The relational database model requires the data be(71)through programs that don't rely on the position of the data in the database. This is in direct(72)to the other database mode, where the program has to follow a series of pointers to the data it seeks. A program(73)a relational database simply asks for the data it seeks; the DBMS performs the necessary searches and(74)the information. The(75)on how the search is done are specific to the DBMS and vary from product to product.A.accessedB.movedC.readD.wrote
The relational database model requires the data be(71)through programs that don't rely on the position of the data in the database. This is in direct(72)to the other database mode, where the program has to follow a series of pointers to the data it seeks. A program(73)a relational database simply asks for the data it seeks; the DBMS performs the necessary searches and(74)the information. The(75)on how the search is done are specific to the DBMS and vary from product to product.
A.accessed
B.moved
C.read
D.wrote
相关考题:
●One use of networks is to let several computers share (71) such as file systems,printers,and tape drives.(71) A.CPUB.memoryC.resourcesD.data
● Project(71)is an uncertain event or condition that, if it occurs, has a positive or a negative effect on at least one project objective, such as time, cost, scope, or quality.(71)A.riskB.problemC.resultD.data
●A firewall is a (71) system designed to (72) an organization′s network against threats.(71) A.operatingB.programmingC.securityD.data(72) A.preventB.protectC.examineD.exploit
Onthedevelopmentdatabaserac0,therearesixrawdevices:/dev/raw/raw1through/dev/raw/raw6./dev/raw/raw1and/dev/raw/raw2are8GBeach,andtherestare6GBeach.Anexistingdiskgroup+DATA1,ofNORMALREDUNDANCY,uses/dev/raw/raw1and/dev/raw/raw2.Whichseriesofthefollowingcommandswilldroponeofthefailuregroupsfor+DATA1,createanewdiskgroup+DATA2usingtwooftheremainingfourrawdevices,andthencancelthedropoperationfrom+DATA1?()A.AB.BC.CD.D
A firewall is a(71)system designed to(72)an organization's network against threats.A.operatingB.programmingC.securityD.data
One use of networks is to let several computers share(71)such as file systems, printers, and tape drives.A.CPUB.memoryC.resourcesD.data
One of the most widely used routing protocols in IP networks is the Routing Information Protocol(RIP).RIP is the canonical example of a routing protocol built on the (71) algorithm.Routing protocols in internetworks differ slightly from the idealized graph model.In aninternetwork,the goal of the routers to forward packets to various (72) .Routers running RIP send their advertisement about cost every (73) seconds.A router also sends an update message whenever an update from another router causes it to change itsrouting table.It is possible to use a range of different metrics or costs for the links in a routing protocol.RIP takes the simplest approach,with all link costs being equal (74) Thus it always tries tofind the minimum hop route.Valid distances are 1 through (75) .This also limits RIP torunning on fairly small networks.(71)A.distance vectorB.link stateC.floodingD.minimum spanning tree
长期存储在计算机内,有组织的、可共享的大量数据的集合是()。 A、数据(Data) B、数据库(DataBase) C、数据库管理系统(DBMS) D、数据库系统(DBS)A.数据(Data)B.数据库(DataBase)C.数据库管理系统(DBMS)D.数据库系统(DBS)