试题(71)~(75)A Bluetooth device can be either a master or a slave and any of the devices within a (71)can be the master. There is only one master and there can be up to (72) active slave devices at a time within a single network. In addition, a device may be a standby slave or a parked slave. There can be up to (73) parked slaves. If there are already maximum number of active slaves, then a parked slave must wait until one of the active slaves switches to (74) mode before it can become active. Within a network, all (75) communications are prohibited.(71)A. Wireless LANB. Wireless MANC. Cellular radio networkD. Piconet(72)A. 7B. 15C. 63D. 255(73)A. 127B. 255C. 511D. 1023(74)A. masterB. standby slaveC. parked slaveD. active slave(75)A. master-to-masterB. master-to-slaveC. slave-to-slaveD. slave-to-master

试题(71)~(75)

A Bluetooth device can be either a master or a slave and any of the devices within a (71)can be the master. There is only one master and there can be up to (72) active slave devices at a time within a single network. In addition, a device may be a standby slave or a parked slave. There can be up to (73) parked slaves. If there are already maximum number of active slaves, then a parked slave must wait until one of the active slaves switches to (74) mode before it can become active. Within a network, all (75) communications are prohibited.

(71)

A. Wireless LAN

B. Wireless MAN

C. Cellular radio network

D. Piconet

(72)

A. 7

B. 15

C. 63

D. 255

(73)

A. 127

B. 255

C. 511

D. 1023

(74)

A. master

B. standby slave

C. parked slave

D. active slave

(75)

A. master-to-master

B. master-to-slave

C. slave-to-slave

D. slave-to-master


相关考题:

●Flow control is a function that prevents network congestion by ensuring that (71) do not overwhelm (72) with datA.There are three commonly used methods for handling network congestion . (73) is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74) are used by receiving devices to help prevent their buffers from overflowing . (75) is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.(71)~(72)A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices(73)~(75) A.BufferB.Source-quench messagesC.BufferingD.Windowing

You need to dump the data from the master server and import it into a new slave server.Which mysqldump option can be used when dumping data from the master server in order to include the master server‘s binary log information?()A.Include-master-infoB.Master-binlogC.Include-log-fileD.Master-data

You need to replicate a table from a master to a slave. The master and slave copies of the table will have different number of columns.Which two conditions must be true?() A.Each extra column in the copy with more columns must not have a default valueB.Columns that are common to both versions of the table must be defined in the same order on the master and the slaveC.The slave database cannot have more columns than the master. Only the master database can have more columnsD.Columns that are common to both versions of the table must come first in the table definition, before any additional columns are additional columns are defined on either serverE.The master database cannot have more columns than the slave. Only the slave deatbase can have more columns

Compare a typical Distributed Replicated Block Device (DRBD) with MySQL Standard Replication using master-slave replication. Which two statements are correct?() A.Both technologies guarantee an identical copy of data on the secondary nodeB.Only MySQL can maintain a time-delayed copy of data on the secondary nodeC.Both technologies use the TCP/IP stack as their primary transmission mediumD.DRBD uses shared-disk technology

● OSI is a theoretical model that shows how any two different systems can communicate with each other.Router, as a networking device, operate at the (71) layer of the OSI model.(71)A.transportB.applicationC.networkD.physical

Bluetooth is a universal radio interface in the(71)frequency hand that enables portable electronic devices to connect and communicate wirelessly via short-range, ad hoc networks. Each unit can simultaneously communicate with up to(72)other units per piconet. Moreover, each unit can simultaneously(73)to several piconets. Eliminates the need for wires, cables and connectors for and between cordless or mobile phones, modems, headsets, PDAs, Computers, printers, projectors, local area networks, and so on, and paves the way for new and completely different devices and applications. Technology Characteristics(74)symbol rate exploits maximum available(75)bandwidth。A.1.95GHzB.2.45GHzC.4.45GHzD.11.45GHz

Flow control is a function that prevents network congestion by ensuring that(71)do not overwhelm(72)with data. There are three commonly used methods for handling network congestion.(73)is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74)are used by receiving devices to help prevent their buffers from overflowing.(75)is a flow -control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices

如果在主板的一个IDE插口上同时接上硬盘和光驱,硬盘应该设置 A.Master SlaveB.Master MasterC.Slave MasterD.Slave Slave

A Bluetooth device can be either a master or a slave and any of the devices within a ( )can be the master. There is only one master and there can be up to (请作答此空) active slave devices at a time within a single network. In addition, a device may be a standby slave or a parked slave. There can be up to ( ) parked slaves. If there are already maximum number of active slaves, then a parked slave must wait until one of the active slaves switches to ( ) mode before it can become active. Within a network, all ( ) communications are prohibited.A.7 B.15 C.63 D.255

A Bluetooth device can be either a master or a slave and any of the devices within a (请作答此空)can be the master. There is only one master and there can be up to ( ) active slave devices at a time within a single network. In addition, a device may be a standby slave or a parked slave. There can be up to ( ) parked slaves. If there are already maximum number of active slaves, then a parked slave must wait until one of the active slaves switches to ( ) mode before it can become active. Within a network, all ( ) communications are prohibited.A.WIRELESS LAN B.WIRELESS MAN C.CELLULAR RADIO NETWORK D.PICONET

A Bluetooth device can be either a master or a slave and any of the devices within a ( )can be the master. There is only one master and there can be up to ( ) active slave devices at a time within a single network. In addition, a device may be a standby slave or a parked slave. There can be up to ( ) parked slaves. If there are already maximum number of active slaves, then a parked slave must wait until one of the active slaves switches to (请作答此空) mode before it can become active. Within a network, all ( ) communications are prohibited.A.MASTER B.STANDBY SLAVE C.PARKED.SLAVE D.ACTIVE SLAVE

A Bluetooth device can be either a master or a slave and any of the devices within a ( )can be the master. There is only one master and there can be up to ( ) active slave devices at a time within a single network. In addition, a device may be a standby slave or a parked slave. There can be up to ( ) parked slaves. If there are already maximum number of active slaves, then a parked slave must wait until one of the active slaves switches to ( ) mode before it can become active. Within a network, all (请作答此空) communications are prohibited.A.MASTER-TO-MASTER B.MASTER-TO-SLAVE C.SLAVE-TO-SLAVE D.SLAVE-TO-MASTER

Which three statements describe the configuration change management feature in DCNM LAN? ()A、 Switch profiles allow configurations to be synchronized between switches and are supported with any Cisco NX-OS Software managed device.B、 DCNM LAN can archive configurations from devices even if they are not managed by the DCNM server, and the administrator can supply the device management IP address and credentials.C、 You can archive a maximum of 50 configuration versions per managed device.D、 Managed devices must be licensed in DCNM LAN before they can be used with configuration change management.E、 Device-running configuration will be archived only if it differs from the last archived version.

The proper safety guidelines for handling any device specific consumables can be found in which of the following documentation?()A、Material Safety Data SheetsB、Installation GuidesC、Consumer ReportsD、Devices Parts Catalog

在给硬盘跳线时,我们常常会看到“Master”和“Slave”标记,它们的含义分别为()。A、“Master”为主盘、”Slave”为从盘B、“Master”为从盘、”Slave”为从盘C、“Master”为第一IDE接口硬盘、“slave”第二IDE接口硬盘D、”Master”为第二IDE接口硬盘、“Slave”第一IDE接口硬盘

You need to dump the data from the master server and import it into a new slave server. Which mysqldump option can be used when dumping data from the master server in order to include the master server's binary log information?()A、Include-master-infoB、Master-binlogC、Include-log-fileD、Master-data

如果在主板的一个IDE插口上同时接上硬盘和光驱,硬盘应该设置A、Master SlaveB、Master MasterC、Slave MasterD、Slave Slave

多选题You have a computer that runs Windows 7. The computer is joined to a domain. You need to ensure thatonly approved USB drives can be used on the computer.  Which two policy settings should you configure?(Each correct answer presents part of the solution.()AEnable Prevent installation of removable devices.BEnable Prevent installation of devices not described by other policy settings.CEnable Prevent installation of devices that match any of these device IDs and enter the device ID for theapproved USB drives.DEnable Allow installation of devices that match any of these device IDs and enter the device ID for theapproved USB drives.

多选题Which three statements describe the configuration change management feature in DCNM LAN? ()ASwitch profiles allow configurations to be synchronized between switches and are supported with any Cisco NX-OS Software managed device.BDCNM LAN can archive configurations from devices even if they are not managed by the DCNM server, and the administrator can supply the device management IP address and credentials.CYou can archive a maximum of 50 configuration versions per managed device.DManaged devices must be licensed in DCNM LAN before they can be used with configuration change management.EDevice-running configuration will be archived only if it differs from the last archived version.

多选题You need to replicate a table from a master to a slave. The master and slave copies of the table will have different number of columns. Which two conditions must be true?()AEach extra column in the copy with more columns must not have a default valueBColumns that are common to both versions of the table must be defined in the same order on the master and the slaveCThe slave database cannot have more columns than the master. Only the master database can have more columnsDColumns that are common to both versions of the table must come first in the table definition, before any additional columns are additional columns are defined on either serverEThe master database cannot have more columns than the slave. Only the slave deatbase can have more columns

问答题Practice 4  Bluetooth is the newest kid on the technology block, and it holds a lot of promise for the assistive technology industry. Named for a 10th Century King of Denmark who unified the kingdoms of Denmark and Norway, Bluetooth is a shot-range wireless communication specification that promises to improve and increase electronic access to a number of environments by overcoming some of the obstacles typical of current technology. Bluetooth technology will enable devices to communicate and transfer data wirelessly and without the line-of-site issues of infra red technology.  So how does it work?  Bluetooth devices search each other out within their given operational range. Unlike devices that are wired together, Bluetooth devices do not have to be aware of the capabilities or properties of the devices to which they will connect beforehand. Bluetooth devices have a built-in mechanism that lets each device identify itself as well as its capabilities as it connects into this new Bluetooth network. This dynamic network does have a controlling device that designates itself as the master for the connection. Its programming and the capabilities necessary for the given task determine whether or not a device can be a master. For example, a cell phone may act as a master device when connecting to a headset, an ATM, or an information kiosk. However, the same cell phone or headset may act as a slave device to the information kiosk, now acting as the master device, broadcasting emergency evacuation information. The cell phone and kiosk can function in either capacity depending on the required function and their programming.

单选题An existing master-slave setup is currently using a delayed replication of one hour. The master has crashed and the slave must be "rolled forward" to provide all the latest data. The SHOW SLAVE STATUS indicates the following values: RELAY_LOG_FILE =hostname-relay-bin.00004 RELAY_LOG_POS = 1383 Which command set would make the slave current?()ASTOP SLAVE; CHANGE MASTER TO MASTER_DELAY =0, RELAY_LOG_FILE = 'hostnamerelay- bin.00004' , RELAY_LOG_POS= 1383BSTOP SLAVE; CHANGE MASTER TO RELAY_LOG_FILE = 'hostname-relay-bin.00004', RELAY_LOG_POS = 1383CSTOP SLAVE; CHANGE MASTER TO MASTER_DELAY=0; START SLAVEDSTOP SLAVE; SET GLOBAL master_delay =0; START SLAVE

多选题Which two statements are true regarding proxy ARP?()AProxy ARP is enabled by default.BProxy ARP is not enabled by default.CJUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.DJUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled

多选题Compare a typical Distributed Replicated Block Device (DRBD) with MySQL Standard Replication using master-slave replication. Which two statements are correct?()ABoth technologies guarantee an identical copy of data on the secondary nodeBOnly MySQL can maintain a time-delayed copy of data on the secondary nodeCBoth technologies use the TCP/IP stack as their primary transmission mediumDDRBD uses shared-disk technology

多选题In which two locations in an enterprise network can an IPS sensor be placed?()Abridging VLANs on two switchesBbridging two VLANs on one switchCbetween two Layer 2 devices withtrunkingDbetween two Layer 2 devices withouttrunkingEbetween a Layer 2 device and a Layer 3 device withtrunking

单选题Which statement is true regarding proxy ARP?()AProxy ARP is enabled by default on stand-alone JUNOS security devices.BProxy ARP is enabled by default on chassis clusters.CJUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.DJUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled

单选题You need to dump the data from the master server and import it into a new slave server. Which mysqldump option can be used when dumping data from the master server in order to include the master server's binary log information?()AInclude-master-infoBMaster-binlogCInclude-log-fileDMaster-data