单选题Which of the following actions will enable 64-bit applications on a system with 32-bit kernel()AUse smit load64bit to enable the 64-bit applications.BRe-install all applications with 64-bit versions.CRe-install the OS with 64-bit kernel enabled.DChange the kernel to 64bit, reboot, and then use the following command: chdev -l sys0 -a applications=64_bit
单选题
Which of the following actions will enable 64-bit applications on a system with 32-bit kernel()
A
Use smit load64bit to enable the 64-bit applications.
B
Re-install all applications with 64-bit versions.
C
Re-install the OS with 64-bit kernel enabled.
D
Change the kernel to 64bit, reboot, and then use the following command: chdev -l sys0 -a applications=64_bit
参考解析
解析:
暂无解析
相关考题:
Which of the following should be used to restrict access to a wireless network?() A. Port forwardingB. Enable SSID broadcastC. Wireless encryptionD. Enable DMZ
Which of the following should a technician do FIRST in the BIOS to set up drive encryption?() A. Enable eSATA supportB. Run built-in diagnosticsC. Enable TPMD. Enable virtualization support
Which of the following actions may cause a trigger to be fired?() A.DROPB.ALTERC.DELETED.ROLLBACK
Which of the following should be used to restrict access to a wireless network?()A、Port forwardingB、Enable SSID broadcastC、Wireless encryptionD、Enable DMZ
Which of the following actions will enable 64-bit applications on a system with 32-bit kernel()A、Use "smit load64bit" to enable the 64-bit applications.B、Re-install all applications with 64-bit versions.C、Re-install the OS with 64-bit kernel enabled.D、Change the kernel to 64bit, reboot, and then use the following command: chdev -l sys0 -a "applications=64_bit"
Which of the following actions may cause a trigger to be fired?()A、DROPB、ALTERC、DELETED、ROLLBACK
A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files. Which of the following actions should the administrator perform?()A、 Enable audit object access and specify files and folders to monitor using Task Manager.B、 Enable audit policy change and specify files and folders to monitor using Windows Explorer.C、 Enable audit object access and specify files and folders to monitor using Windows Explorer.D、 Open Performance Monitor and monitor folder activity.
Which of the following technologies allows a single physical processor to do the work of multiple processors?()A、Symmetric multi-processingB、MulticoreC、64-bit processingD、Hyper-V
Which of the following would be the BEST way to restrict access to the WAP from certain clients?()A、Disable DHCP serverB、Enable WEP encryptionC、Disable SSID broadcastD、Enable MAC filtering
Which of the following operating system types will allow a user to utilize 16GB of RAM if installed on a PC workstation?()A、8-bitB、16-bitC、32-bitD、64-bit
Which of the following describes the random access memory limitations with Vista 64-bit operating system?()A、2GBB、4GBC、8GBD、128GB
Which of the following operating systems can Hyper-V run on?()A、64-bit Linux Enterprise EditionB、64-bit Windows Server 2008C、32-bit Windows Server 2008D、64-bit Windows Server 2003
Which of the following technologies is specifically designed to increase server virtualization performance?()A、 Multicore processingB、 VTC、 64-bit processingD、 Hyperthreading
Which of the following wireless security techniques is the MOST secure?()A、Enable Wired Equivalent PrivacyB、Disable SSID broadcastC、Enable Wi-Fi Protected AccessD、Enable MAC filtering
When installing a new scanner, Windows XP does not automatically recognize the scanner. Which of the following actions should be taken?()A、Use the Scanners and Cameras Wizard to add the device.B、Enable the scanner in the BIOS.C、Add new printer Wizard.D、Ensure the scanner is not locked.
Which of the following actions will enable 64-bit applications on a system with a 32-bit kernel?()A、change the kernel to 64bit, reboot, and then use the following command:chdev -l sys0 -a applications=64_bitB、Re-install the OS with 64-bit kernel enabledC、Re-install all applications with 64-bit versionsD、Use smit to enable the 64-bit applications
A system administrator is doing an AIX 5L New and Complete Overwrite installation on a system with a 64-bit processor using the default settings. Which of the following will be the resulting installed environment?()A、Only the 32-bit kernel will be installed and enabledB、Only the 64-bit kernel will be installed and enabledC、Both the 32-bit and 64-bit kernel will be installed and the 32-bit kernel will be enabledD、Both the 32-bit and 64-bit kernel will be installed and the 64-bit kernel will be enabled
In order to enable remote administration of users and tablespaces on an Oracle database, which of the following types of files must exist in the database?()A、Password file B、Initialization file C、Datafile D、Control file E、Nothing - SYSDBA privileges are not required for these actions
You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()A、Enable automatic certificate enrollmentB、Enforce smart card logonsC、Enable Encrypting File System (EFS) for offline filesD、Enable a screen saver password
单选题In order to enable remote administration of users and tablespaces on an Oracle database, which of the following types of files must exist in the database?()APassword file BInitialization file CDatafile DControl file ENothing - SYSDBA privileges are not required for these actions
单选题A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files. Which of the following actions should the administrator perform?()A Enable audit object access and specify files and folders to monitor using Task Manager.B Enable audit policy change and specify files and folders to monitor using Windows Explorer.C Enable audit object access and specify files and folders to monitor using Windows Explorer.D Open Performance Monitor and monitor folder activity.
多选题You want to enable resumable space allocation at the instance level. Which two actions would enable resumable space allocation at the instance level?()Aissuing the ALTER SYSTEM ENABLE RESUMABLE;statementBissuing the ALTER SESSION ENABLE RESUMABLE;statementCmodifying the RESUMABLE_TIMEOUT initialization parameter to a nonzero valueDissuing the ALTER SYSTEM SET RESUMABLE_TIMEOUT=;statement
单选题Which of the following technologies is specifically designed to increase server virtualization performance?()A Multicore processingB VTC 64-bit processingD Hyperthreading
单选题Which one of the following commands can be used to enable AAA authentication to determine if a user canaccess the privilege command level?()Aaaa authentication enable method defaultBaaa authentication enable defaultCaaa authentication enable levelDaaa authentication enable default local
单选题Which of the following technologies allows a single physical processor to do the work of multiple processors?()A Symmetric multi-processingB MulticoreC 64-bit processingD Hyper-V
单选题Which of the following actions will enable 64-bit applications on a system with a 32-bit kernel?()Achange the kernel to 64bit, reboot, and then use the following command:chdev -l sys0 -a applications=64_bitBRe-install the OS with 64-bit kernel enabledCRe-install all applications with 64-bit versionsDUse smit to enable the 64-bit applications