Computers with the same ( )can typically use the same software and peripheral devices.A. CPUB. operating systemC. mainboardD. display

Computers with the same ( )can typically use the same software and peripheral devices.

A. CPUB. operating systemC. mainboardD. display


相关考题:

●Which one of these statements about connecting to the Internet is true? (68) .(68) A.The Internet can only be used to link computers with same operating systemB.The Internet can be used to connect computers with different ISPC.You must have a telephone line to connect to the InternetD.You must have a modem to connect to the Internet

Which one of these statements about connecting to the Internet is true?(68).A.The Internet can only be used to link computers with same operating systemB.The Internet can be used to connect computers with different ISPC.You must have a telephone line to connect to the InternetD.You must have a modem to connect to the Internet

Which organizations can post to the same set of books?() A.those organizations that share the same functional currency, calendar and accounting flexfield structureB.those organizations that share the same currency but do not share the same calendar and accounting flexfield structureC.those organizations that share the same accounting flexfield structure but do not share the same calendar and functional currencyD.those organizations that share the same calendar but do not share the same functional currency and accounting flexfield structure

Which of these assumptions is necessary to use in system balance? ()A、The sensitivity is the same for the MS and the BTS.B、The path loss is the same for the MS and the BTS.C、The feeder loss is the same for the MS and the BTS.D、The antenna gain is the same for the MS and the BTS.E、The combiner loss is the same for the MS and the BTS.

Which statement about WSA access logs that are to be processed by sawmill for cisco ironport istrue?() A、 the default log format can be usedB、 the fields"%XC%X n" must be appended to the default access log formatC、 any log format can beused , but all WSAs must use the same formatD、 any log format can be used. And different WSAs may use different formats

A college has a small campus where 25 faculty members are located. The faculty offices and student computers are currently on the same network. The faculty are concerned about students being able to capture packets going across the network and obtain sensitive material. What could a network administrator do to protect faculty network traffic from student connections?()A、Install anti-virus software on the student computers.B、Put the faculty computers in a separate VLAN.C、Power down the switches that connect to faculty computers when they are not in use.D、Remove the student computers from the network and put them on a peer-to-peer network.E、Create an access list that blocks the students from the Internet where the hacking tolls are located.

Which TWO of the following are required to use the hot-swap memory feature of the x445 while being operating system independent?()A、Memory Mirroring must be enabled in the BIOS.B、Redundant bit steering must be enabled in the BIOS.C、DIMMs must be the same size and speed as the DIMMs being replaced.D、Memory Mirroring must be enabled in the operating system.E、DIMMs can be of same size or larger or same speed or faster.

What is system balance? ()A、Each cell can handle the same amount of subscribersB、The network is dimensioned for all mobile classesC、All cells are of the same sizeD、All BTSs use the same output powerE、Uplink and downlink coverage is the same

Which description about asymmetric encryption algorithms is correct?()A、They use the same key for encryption and decryption of data.B、They use different keys for decryption but the same key for encryption of data.C、They use different keys for encryption and decryption of data.D、They use the same key for decryption but different keys for encryption of data.

What are three benefits of implementing vlans?()A、A more efficient use of bandwidth can be achieved allowing many physical groups to use the same network infrastructureB、Broadcast storms can be mitigated by decreasing the number of broadcast domains,thus increasing their size.C、A higher level of network security can be reached by separating sensitive data traffic from other network traffic.D、Port-based vlans increase switch-port use efficient,thanks to 802.1Q trunksE、A more efficient use of bandwidth can be achieved allowing many logical networks to use the same network infrastructure.F、Broadcast storms can be mitigated by increasing the number of broadcast domains,thus reducing their size.G、VLANs make it easier for IT staff to configure new logical groups,because the vlans all belong to the same broadcast domain.

Which two statements are true regarding transactions in an Oracle database()A、Multiple transactions can use the same undo segment.B、A transaction is assigned an undo segment when it is started.C、More than one transaction cannot share the same extent in the undo tablespace.D、The transactions use system undo segment to store undo data if all the segments in the undo tablespaceare used.

Ml Managed Servers in a domain must run the of the OrcleWebLogic Server software()A、 same version B、 different versionsC、 same patch setD、 most recent patch set

You are the administrator of your company’s network. The software department is preparing to rewrite an accounting application so that it will run on Windows 2000 Professional computers. All of the computers in the software department currently use Windows 98.  You want to configure the computers in the software department so that the users can use both Windows 98 and Windows 2000 Professional during the project. You also want to ensure that the computers are configured for optimal disk performance. In addition you want to ensure that users in the software department can access all of the files on their computers by using either operating system.  What should you do? ()A、 Create and format a FAT 32 partition.B、 Create and format an NTFS volume.C、 Configure Windows 2000 Professional to enable disk compression.D、 Configure Windows 2000 Professional to enable dynamic volume

多选题Which two statements are true regarding transactions in an Oracle database()AMultiple transactions can use the same undo segment.BA transaction is assigned an undo segment when it is started.CMore than one transaction cannot share the same extent in the undo tablespace.DThe transactions use system undo segment to store undo data if all the segments in the undo tablespaceare used.

多选题Which two installations must be completed to allow third-party software to interact with the Cisco Unified CallManager Express system through TAPI Lite?()Athe files in the Cisco IOS TSP file on all Windows PCs on the LANBboth the Cisco IOS TSP and TAPI Lite files on all Windows PCs on the LANCthe Cisco TAPI Lite files on the same Windows PC where the software is installedDthe files in the Cisco IOS TSP file on the same Windows PC where the software is installedEthe Cisco IOS TSP on the same Windows PC where the software is installed and on all remote teleworker PCs

单选题Which organizations can post to the same set of books?()Athose organizations that share the same functional currency, calendar and accounting flexfield structureBthose organizations that share the same currency but do not share the same calendar and accounting flexfield structureCthose organizations that share the same accounting flexfield structure but do not share the same calendar and functional currencyDthose organizations that share the same calendar but do not share the same functional currency and accounting flexfield structure

单选题It can be concluded from the passage that NIF, Hiper, Iter ______.Ause three different approaches to achieve the same goalBare at the same progressChave proved to the public their achievementDaim at the same goal

多选题Which two statements are true about the WebLogic Cluster ?()AClustered Servers capacity can be increased by adding new server instance to the cluster on an existing machineBClustered Servers can be on a same or different machine with same operating system onlyCClustered Servers can only be on a same machine or different operating systemDClustered Servers can be on a same or different machine with same or different operating system

单选题A college has a small campus where 25 faculty members are located. The faculty offices and student computers are currently on the same network. The faculty are concerned about students being able to capture packets going across the network and obtain sensitive material. What could a network administrator do to protect faculty network traffic from student connections?()AInstall anti-virus software on the student computers.BPut the faculty computers in a separate VLAN.CPower down the switches that connect to faculty computers when they are not in use.DRemove the student computers from the network and put them on a peer-to-peer network.ECreate an access list that blocks the students from the Internet where the hacking tolls are located.

多选题Which TWO of the following are required to use the hot-swap memory feature of the x445 while being operating system independent?()AMemory Mirroring must be enabled in the BIOS.BRedundant bit steering must be enabled in the BIOS.CDIMMs must be the same size and speed as the DIMMs being replaced.DMemory Mirroring must be enabled in the operating system.EDIMMs can be of same size or larger or same speed or faster.

多选题Which of the following cable types can transmit at 100 Mbps and has the SAME transmissiondistance without the use of a repeater?()ACAT6BRG-59CCAT5eDCAT3ERG-6

多选题What are three benefits of implementing vlans?()AA more efficient use of bandwidth can be achieved allowing many physical groups to use the same network infrastructureBBroadcast storms can be mitigated by decreasing the number of broadcast domains,thus increasing their sizeCA higher level of network security can be reached by separating sensitive data traffic from other network trafficDPort-based vlans increase switch-port use efficient,thanks to 802.1Q trunksEA more efficient use of bandwidth can be achieved allowing many logical networks to use the same network infrastructureFBroadcast storms can be mitigated by increasing the number of broadcast domains,thus reducing theirsizeGVLANs make it easier for IT staff to configure new logical groups,because the vlans all belong to thesame broadcast domain

单选题Ml Managed Servers in a domain must run the of the OrcleWebLogic Server software()A same version B different versionsC same patch setD most recent patch set

多选题You need to ensure that the stored procedure that inserts new loan requests can access data in tables that are stored in another database on the same SQL Server instance. Which two actions should you perform?()AEnsure that the stored procedure and the tables are owned by users that are associated with the same SQL Server login.BEnsure that the stored procedure and the tables are owned by the same database user.CEnsure that the stored procedure and the tables use the same database schema.DConfigure the multiuser database option on both databases.EConfigure the cross-database ownership chaining option on both databases.

单选题You are planning the deployment of Windows 7 to computers that are located in a main office, in branch offices, and in a store kiosk.  Computers in all three types of location use the same hardware.   Kiosk computers are members of a workgroup. Kiosk computers must use specific settings for local security.   Branch office computers must use BitLocker Drive Encryption.   You have the following requirements:Create deployment images. Minimize image maintenance.   You need to define an image-creation strategy that meets the requirements.   What should you do?()ACreate a single image to use for the main office computers and the branch office computers, and apply the requiredsettings through Group Policy. Create a separate image to use for the kiosk computers.BCreate one image to use for each location type. Encrypt the hard disks on the branch office computers prior to capturing the image.CCreate a single image to use for all location types. Create a custom Windows security template for each location type.DCreate a single image to use for the branch office computers and the kiosk computers.Create a separate image to use for the main office computers.

单选题()is a category assigned to products or services having the same functional use but different technical characteristics. It is not same as quality.AProblemBGradeCRiskDDefect

单选题Which description about asymmetric encryption algorithms is correct?()AThey use the same key for encryption and decryption of data.BThey use different keys for decryption but the same key for encryption of data.CThey use different keys for encryption and decryption of data.DThey use the same key for decryption but different keys for encryption of data.