The(72)turns the source file into an object file and the(73)turns the object file into an executable file.A.translatorB.compilerC.interpreterD.linker

The(72)turns the source file into an object file and the(73)turns the object file into an executable file.

A.translator

B.compiler

C.interpreter

D.linker


相关考题:

You develop a serializable class for persisting objects as files.Every time an object is serialized, you have to update the database with the name of the object and location of that file.You elect to employ the OnSerialized attribute to achieve this objective.You now need to apply the OnSerialized attribute to a certain method.What should you do?()A.B.C.D.

Certkiller.com has given you the task of serializing an object and writing it to a data file using binary serialization.You need to ensure that you meet these requirements.What should you do?() A.B.C.D.

有以下程序: include include include intmain() {fstreamfil 有以下程序:include <iostream.h>include <fstream.h>include <stdlib.h>int main(){fstream filel,file2;char line[100];filel.open("source.txt",ios::in);if(!file1){cout<<"Can't open file source.txt!"<<end1;abort();}file2.open("dest.txt",ios::out);if(!file2){cout<<"Can't open file dest.txt!"<<end1;abort();}while(!file1.eof()){filel.getline(1ine,100);file2<<line;file2<<end1;}filel.close();file2.close();return 0;}此程序实现的功能是【 】。

FileSystem Object有两个方法,分别为CreatText File方法和OpenText File方法。

Which the two are concerning the objects available to developers creating tag files?()A、 The session object must be declared explicity.B、 The request and response objects are available implicity.C、 The output stream is available through the implicit outStream object.D、 The servlet context is available through the implicit servletContext object.E、 The JspContext for the tag file is available through the implicit jspContext object.

With respect to a computer file system, an access control list (ACL) is a list of permissions attached to an object. Which of the following makes forwarding decisions in hardware?()A、IETFB、PFCC、TCAMD、ASIC

You completed your workflow definition. You want to save a copy of the definition to the file system for source control purposes. How does Oracle Workflow Builder save that file?()A、as a flat fileB、as a BPEL-compiled definitionC、as an XML file with an associated document type definition (DTD)D、as an XML file without an associated document type definition (DTD)

Which tool in the layout model could you use to create an external boiler plate object?()A、Field B、Frame C、Button D、RectangleE、Link file

Your company has file servers located in an organizational unit named Payroll. The file servers  contain payroll files located in a folder named Payroll.     You create a GPO. You need to track which employees access the Payroll files on the file  servers.   What should you do()    A、Enable the Audit object access option. Link the GPO to the Payroll organizational unit. On the file servers, configureB、Enable the Audit object access option. Link the GPO to the domain. On the domain controllers, configure Auditing fC、Enable the Audit process tracking option. Link the GPO to the Domain Controllers organizational unit. On the file seD、Enable the Audit process tracking option. Link the GPO to the Payroll organizational unit. On the file servers, config

You are designing a strategy for migrating the UNIX user accounts to Active Directory.  Which three actions should you perform?()A、 Import the user accounts as inetOrgPerson objects.B、 Import the user accounts into Active Directory by using the Ldifde command-line tool.C、 Export all user accounts from the UNIX servers to a text file.D、 Export all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.E、 Assign random passwords to each user object, and securely distribute the password to the users.F、 Create the same strong password for each user object, and require users to change their passwords at first logon.G、 Instruct users to use the same name and password as they used on the UNIX servers.

Your company purchases a new application to deploy on 200 computers. The application requires  that you modify the registry on each target computer before you install the application.     The registry modifications are in a file that has an .adm extension.     You need to prepare the target computers for the application.     What should you do()A、Import the .adm file into a new Group Policy Object (GPO). Edit the GPO and link it to an organizational unit that computer.B、Create a Microsoft Windows PowerShell script to copy the .adm file to the startup folder of each target computer.C、Create a Microsoft Windows PowerShell script to copy the .adm file to each computer. Run the REDIRUsr CONTAID、Create a Microsoft Windows PowerShell script to copy the .adm file to each computer. Run the REDIRCmp CONTA

You are developing an application to create a new file on the local file system.You need to define specific security settings for the file. You must deny the file inheritance of any default security settings during creation.What should you do?()A、Create the file by using a new FileStream object by passing the FileSecurity object as a parameter to the FileStream constructor.B、Create a new FileSecurity object.C、Apply the permissions by using the File class.D、Create a new FileSystem Access Rule object for each permission that you need,and add each rule to the FileSecurity object.E、Create a new FileSystem Audit Rule object and add it to the FileSecurity object.

多选题You are designing a strategy for migrating the UNIX user accounts to Active Directory. Which three actions should you perform?()AImport the user accounts as inetOrgPerson objects.BImport the user accounts into Active Directory by using the Ldifde command-line tool.CExport all user accounts from the UNIX servers to a text file.DExport all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.EAssign random passwords to each user object, and securely distribute the password to the users.FCreate the same strong password for each user object, and require users to change their passwords at first logon.

单选题You are creating a sales data template and need to add a picture to the margin. What is the best way to add this margin?()AChoose the margin code in the object navigator and select file-import-image. BChoose the margin node in the object navigator and use the tool bar button. CClick the margin button in the layout model and select file-import-image. DClick the margin button in the layout model and use the tool bar button.

单选题Given that file is a reference to a File object that represents a directory, which code fragments will succeed in obtaining a list of the entries in the directory?()AVector filelist = ((Directory) file).getList();BString[] filelist = file.directory();CEnumeration filelist = file.contents();DString[] filelist = file.list();EVector filelist = (new Directory(file)).files();

单选题Your company has file servers located in an organizational unit named Payroll. The file servers contain payroll files located in a folder named Payroll. You create a GPO. You need to track which employees access the Payroll files on the file servers. What should you do()AEnable the Audit object access option. Link the GPO to the Payroll organizational unit. On the file servers, configure Auditing for the Everyone group in the Payroll folder.BEnable the Audit object access option. Link the GPO to the domain. On the domain controllers, configure Auditing for the Authenticated Users group in the Payroll folder.CEnable the Audit process tracking option. Link the GPO to the Domain Controllers organizational unit. On the file servers, configure Auditing for the Authenticated Users group in the Payroll folder.DEnable the Audit process tracking option. Link the GPO to the Payroll organizational unit. On the file servers, configure Auditing for the Everyone group in the Payroll folder.

单选题You completed your workflow definition. You want to save a copy of the definition to the file system for source control purposes. How does Oracle Workflow Builder save that file?()Aas a flat fileBas a BPEL-compiled definitionCas an XML file with an associated document type definition (DTD)Das an XML file without an associated document type definition (DTD)

单选题Which statements are true, given the code new FileOutputStream("data", true) for creating an object of class FileOutputStream?()AFileOutputStream has no constructors matching the given arguments.BAn IOExeception will be thrown if a file named data already exists.CAn IOExeception will be thrown if a file named data does not already exist.DIf a file named data exists, its contents will be reset and overwritten.EIf a file named data exists, output will be appended to its current contents.

多选题You are developing an application to create a new file on the local file system.You need to define specific security settings for the file. You must deny the file inheritance of any default security settings during creation.What should you do?()ACreate the file by using a new FileStream object by passing the FileSecurity object as a parameter to the FileStream constructor.BCreate a new FileSecurity object.CApply the permissions by using the File class.DCreate a new FileSystem Access Rule object for each permission that you need,and add each rule to the FileSecurity object.ECreate a new FileSystem Audit Rule object and add it to the FileSecurity object.

单选题You create an unattended installation file named unattend.txt. You plan to use an answer file to perform an automated installation of Windows XP Professional. You need to ensure that a line-of-business application is installed automatically after the installation of Windows XP Professional is complete. What should you do?()AAdd a [GuiUnattend] section to unattend.txt.BInclude a [GuiRunOnce] section in unattend.txt.CCreate an unattend.bat file. Place the file in the root of the installation source files.DCreate a registry file named setup.reg. Place the file in the root of the installation source files.

多选题Which the two are concerning the objects available to developers creating tag files?()AThe session object must be declared explicity.BThe request and response objects are available implicity.CThe output stream is available through the implicit outStream object.DThe servlet context is available through the implicit servletContext object.EThe JspContext for the tag file is available through the implicit jspContext object.

单选题Which tool in the layout model could you use to create an external boiler plate object?()AField BFrame CButton DRectangleELink file

单选题You create a Web application to process XML documents. The Web application receives XML document files from several sources, reads them, and stores them in a Microsoft SQL Server database. The Web application parses all incoming data files to ensure that they conform to an XML schema. You need to find all validation errors in the XML document. What should you do? ()ALoad the XML data by using an instance of the XmlDocument class and specify a location for the application schema.BConfigure the ValidationEventHandler in the XmlReaderSettings of the XmlReader object.CRead the XML file into a DataSet object and set the EnforceConstraints property to True.DRead the XML file into a DataSet object. Handle the DataSet.MergeFailed event to parse the data that does not conform to the XML schema.

多选题10. class MakeFile {  11. public static void main(String[] args) {  12. try {  13. File directory = new File(”d”);  14. File file = new File(directory,”f”);  15. if(!file.exists()) {  16. file.createNewFile();  17. }  18. } catch (IOException e) {  19. e.printStackTrace  20. }  21. }  22. }  The current directory does NOT contain a directory named “d.” Which three are true?()ALine 16 is never executed.BAn exception is thrown at runtime.CLine 13 creates a File object named “d”.DLine 14 creates a File object named “f‟.ELine 13 creates a directory named “d” in the file system.FLine 16 creates a directory named “d” and a file “f”  within it in the file system.GLine 14 creates a file named f inside of the directory named “d” in the file system.

单选题You are developing a report to allow customers in a department store to view product information. You added a button to the layout to allow customers to view the picture of the product. Which button property would you alter to specify the source of the .BMP file?()AType BMultimedia file CMulti media file type DLabel type