单选题Which of the following technologies can detect and fix single bit memory errors?()A RAIDB Registered memoryC SDRAMD ECC

单选题
Which of the following technologies can detect and fix single bit memory errors?()
A

 RAID

B

 Registered memory

C

 SDRAM

D

 ECC


参考解析

解析: 暂无解析

相关考题:

Which two statements are true about the RMAN validate database command?() A. It checks the database for intrablock corruptions.B. It can detect corrupt pfiles.C. It can detect corrupt spfiles.D. It checks the database for interblock corruptions.E. It can detect corrupt block change tracking files.

Which of the following wireless technologies can support the GREATEST distance on either 2.4GHz or 5GHz frequencies?() A.802.11aB.802.11bC.802.11gD.802.11n

Which of the following technologies can detect and fix single bit memory errors?() A. RAIDB. Registered memoryC. SDRAMD. ECC

Which of the following technologies can improve convergence time following a link failure in a serviceprovider network?()A、MPLS TE FRB、MPLS VPNC、BFDD、RSVPE、VPLSF、SNMP

A WORM drive can be equated to which of the following common technologies?()A、 CDRWB、 CDRC、 Flash MediaD、 DVDRW

Which two statements are true about the RMAN validate database command?()A、It checks the database for intrablock corruptions.B、It can detect corrupt pfiles.C、It can detect corrupt spfiles.D、It checks the database for interblock corruptions.E、It can detect corrupt block change tracking files.

Which of the following wireless technologies can operate at only 5GHz?()A、802.11b/gB、802.11gC、802.11bD、802.11a

Which of the following are storage technologies that can be hot swappable?()A、SCSIB、SASC、ATAD、IDEE、CMOS

Which of the following Windows Server 2003 technologies can help with making backups of open files?()A、Differential backupB、SnapshotC、VSSD、Incremental backup

Which of the following virtualization technologies can save time during provisioning?()A、CloningB、SnapshotsC、ClusteringD、Virtual memory

Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()A、Intrusion detectionB、VirtualizationC、KitingD、Cloning

Which of the following technologies can detect and fix single bit memory errors?()A、RAIDB、Registered memoryC、SDRAMD、ECC

Which of the following wireless technologies can support the GREATEST distance on either 2.4GHz or 5GHz frequencies?()A、802.11aB、802.11bC、802.11gD、802.11n

Which of the following technologies can provide geographically based load balancing with high availability between two web servers with static content?()A、MulticastB、Active/passive clusterC、Active/active clusterD、DNS round robin

A system administrator is deploying a new POWER5 server. The application requires AIX 5L V5.2.  Which of the following virtualization technologies can be used?()A、DLPARB、Micro-PartitioningC、Virtual StorageD、Virtual Ethernet

Which of the following methods can be used to detect block corruption?()  A、 ANALYZE operationsB、 dbvC、 SQL queries that access the potentially corrupt blockD、 RMANE、 All of the above

单选题Which of the following Windows Server 2003 technologies can help with making backups of open files?()A Differential backupB SnapshotC VSSD Incremental backup

多选题Which of the following technologies can be used to remotely gain access to a server console?()APS/2 KVMBLDAPCVNCDRemote desktopEVPN

单选题Which of the following nondestructive testing methods can be used to detect a suspected subsurface defect in a tail-shaft liner?()ADye penetrantBMagnetic particleCUltrasonicDAll of the above

单选题Which of the following technologies can improve convergence time following a link failure in a serviceprovider network?()AMPLS TE FRBMPLS VPNCBFDDRSVPEVPLSFSNMP

单选题Which of the following technologies can save server space and cooling requirements?()AEnergy star ratingsBActive solar panelsCNetwork storage arrayDBlade servers

单选题A WORM drive can be equated to which of the following common technologies?()A CDRWB CDRC Flash MediaD DVDRW

单选题Which of the following methods can be used to detect block corruption?()A ANALYZE operationsB dbvC SQL queries that access the potentially corrupt blockD RMANE All of the above

多选题Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()ASpanning Tree ProtocolBShortest path first treeCLink-state advertisements (LSA)DHold-down timersESplit horizonFVRP

多选题Which of the following are storage technologies that can be hot swappable?()ASCSIBSASCATADIDEECMOS

单选题Which of the following wireless technologies can operate at only 5GHz?()A802.11b/gB802.11gC802.11bD802.11a

单选题Which of the following statements is NOT a characteristic of a welfare state mentioned in this passage?AFree education is available to a child.BLaws are made to fix the minimum wage.CA jobless person can be insured.DThere are regulations for rent.