单选题Your application uses two threads, named threadOne and threadTwo.You need to modify the code to prevent the execution of threadOne until threadTwo completes execution. What should you do?()AConfigure threadOne to run at a lower priority.BConfigure threadTwo to run at a higher priority.CUse a WaitCallback delegate to synchronize the threads.DCall the Sleep method of threadOne.ECall the SpinLock method of threadOne.

单选题
Your application uses two threads, named threadOne and threadTwo.You need to modify the code to prevent the execution of threadOne until threadTwo completes execution. What should you do?()
A

Configure threadOne to run at a lower priority.

B

Configure threadTwo to run at a higher priority.

C

Use a WaitCallback delegate to synchronize the threads.

D

Call the Sleep method of threadOne.

E

Call the SpinLock method of threadOne.


参考解析

解析: 暂无解析

相关考题:

You are writing an application that uses isolated storage to store user preferences.The application uses multiple assemblies.Multiple users will use this application on the same computer.You need to create a directory named Preferences in the isolated storage area that is scoped to the current Microsoft Windows identity and assembly.Which code segment should you use?()A.B.C.D.

You are writing an application that uses SOAP to exchange data with other applications.You use a Department class that inherits from ArrayList to send objects to another application.The Department object is named dept.You need to ensure that the application serializes the Department object for transport by using SOAP.Which code should you use?()A.B.C.D.

What are two uses of the AS Path attribute?() (Choose two.) A. route selectionB. loop avoidanceC. determining equal cost paths for reachabliltyD. defining the application of other BGP attributes

You are the network administrator for Your network contains a single Active Directory domain named All network servers run Windows Server 2003.One of your application servers runs proprietary software. This server stops responding. After help desk technicians restart the server, it appears to run normally.Two weeks later, the same server stops responding again. You need to gather and store data to diagnose the problem.What should you do?()A. Open Event Viewer and review the security logs on the server.B. Create a System Monitor log that uses memory counters and gather data over time.C. Open Task Manager and gather memory usage statistics.D. Modify Boot.ini to use /maxmem:1536.

If you want to use the Java EE platform’s built-in type of authentication that uses a custom HTML page for authentication. Which two statements are true?()A、Your deployment descriptor will need to contain this tag: CUSTOM.B、The related custom HTML login page must be named loginPage.html.C、When you use this type of authentication, SSL is turned on automatically.D、You must have a tag in your deployment descriptor that allows you to point to both a login HTML pageand an HTML page for handling any login errors.E、In the HTML related to authentication for this application, you must use predefined variable names fort he variables that store the user and password values.

You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()A、ICMPB、SNMPC、TCPD、HTTPS

Which of the following best describes Simultaneous Multi-threading (SMT)?()A、A POWER5 microprocessor feature that allocates two processors to each applicationB、A Workload Manager feature that allows two processing threads to be executing on a single processorC、An AIX v5.2 feature that allows two processing threads to be executing on a single processor concurrentlyD、A POWER5 microprocessor feature that allows two processing threads to be executing on a single processor concurrently

Which two statements are true?()A、It is possible for more than two threads to deadlock at once.B、The JVM implementation guarantees that multiple threads cannot enter into a deadlocked state.C、Deadlocked threads release once their sleep() method’s sleep duration has expired.D、Deadlocking can occur only when the wait(), notify(), and notifyAll() methods are used incorrectly.E、It is possible for a single-threaded application to deadlock if synchronized blocks are used incorrectly.F、If a piece of code is capable of deadlocking, you cannot eliminate the possibility ofdeadlocking by insertinginvocations of Thread.yield().

You want to migrate an application that was developed for OAS/OC4J to WebLogic. The application uses Oracle Streams Advanced Queuing (AQ). You configured a Foreign JMS Server and Data Source but you are not able to send messages to the AQ destination and see them reach the database. Which two things are missing in this configuration?()A、nothing, there may be a network connection issueB、a Foreign JMS Connection FactoryC、a JMS Bridge to map the JNDI of the Local JMS Destination to the remote AQ destinationD、a mapping of the Foreign JMS Connection Factory to the Data Source where AQ is configured and installedE、Oracle AQ Java EE Shared Libraries not deployed and referenced by your application

You are a database administrator for your company. The company uses a vendor company’s application that is based on a proprietary database. You query data from the application database and import the data into a SQL Server 2005 database. The application vendor provides you with a new OLE DB driver to be used when querying the application database. Company policy prohibits connections between the SQL Server database and the application database, except when querying this data. You need to provide a way to query data from the application database. What should you?()A、Configure a Linked Server connection to the application database.B、Write a query that uses an OPENDATASOURCE command.C、Write a query that uses an OPENQUERY command.D、Configure a Remote Server connection to the application database.

You install a third-party application on your computer. The application uses port 80 to negotiate a listening port. After establishing the listening port, the application uses dynamic ports above 6000.  You need to configure Microsoft Windows Firewall to allow traffic for the application.  What should you do? ()A、Add a port exception for port 80.B、Disable the Core Networking exception.C、Restore the Windows Firewall defaults.D、Add a program exception for the new application.

Your company uses Microsoft Application Virtualization (App-V). You maintain the sequencing for applications. You need to add a template to an existing sequenced application. What should you do?()A、Edit the application, add the template, and then save the application with a new name.B、Sequence the template as a new application to the original application installation folder.C、Restore the sequencing computer and add the template to the original application installation folder.D、Upgrade the existing sequencing package, add the template to the package, and then save the application.

Your application uses two threads, named threadOne and threadTwo. You need to modify the code to prevent the execution of threadOne until threadTwo completes execution. What should you do?()A、 Configure threadOne to run at a lower priority.B、 Configure threadTwo to run at a higher priority.C、 Use a WaitCallback delegate to synchronize the threads.D、 Call the Sleep method of threadOne. E、 Call the SpinLock method of threadOne.

Your company has an organizational unit named Production. The Production organizational unit has achild organizational unit named RD. You create a GPO named Software Deployment and link it to the  Production organizational unit. You create a shadow group for the RD organizational unit.   You need to deploy an application to users in the Production organizational unit.  You also need to ensure  that the application is not deployed to users in the RD organizational unit.    What are two possible ways to achieve this goal()A、Configure the Enforce setting on the software deployment GPO.B、Configure the Block Inheritance setting on the RD organizational unit.C、Configure the Block Inheritance setting on the Production organizational unit.D、Configure security filtering on the Software Deployment GPO to Deny Apply group policy for the RD  security group.

Your network contains an Active Directory domain named contoso.com. The domain contains a   server named Server1. The Active Directory Federation Services (AD FS) role is installed on Server1. Contoso.com is defined as an account store.   A partner company has a Web-based application that uses AD FS authentication. The partner company  plans to provide users from contoso.com access to the Web application.   You need to configure AD FS on contoso.com to allow contoso.com users to be authenticated by the   partner company.   What should you create on Server1()A、a new applicationB、a resource partnerC、an account partnerD、an organization claim

多选题If you want to use the Java EE platform’s built-in type of authentication that uses a custom HTML page for authentication. Which two statements are true?()AYour deployment descriptor will need to contain this tag: CUSTOM.BThe related custom HTML login page must be named loginPage.html.CWhen you use this type of authentication, SSL is turned on automatically.DYou must have a tag in your deployment descriptor that allows you to point to both a login HTML pageand an HTML page for handling any login errors.EIn the HTML related to authentication for this application, you must use predefined variable names fort he variables that store the user and password values.

多选题What are two uses of the AS Path attribute?() (Choose two.)Aroute selectionBloop avoidanceCdetermining equal cost paths for reachabliltyDdefining the application of other BGP attributes

单选题You have two processes, P1 and P2 on you computer. You notice that when you execute both the process at a time, process P2 always times out, while if you pause process P1, process P2 starts running fine. Process P1 runs in "Real Time" priority and uses twelve threads while process P1 runs in "Normal" priority and uses one thread. What should you do to solve this problem? ()AIncrease the number of threads for process P2.BIncrease the priority for process P2.CDecrease the number of threads for process P1.DDecrease the priority for process P1 to ’Normal’.

多选题You have been asked to develop an application that uses only connection-oriented protocols. Which two protocols can you use?()APPPBUDPCTCPDICMP

单选题Which of the following best describes Simultaneous Multi-threading (SMT)?()AA POWER5 microprocessor feature that allocates two processors to each applicationBA Workload Manager feature that allows two processing threads to be executing on a single processorCAn AIX v5.2 feature that allows two processing threads to be executing on a single processor concurrentlyDA POWER5 microprocessor feature that allows two processing threads to be executing on a single processor concurrently

单选题Your application uses two threads, named threadOne and threadTwo. You need to modify the code to prevent the execution of threadOne until threadTwo completes execution. What should you do?()A Configure threadOne to run at a lower priority.B Configure threadTwo to run at a higher priority.C Use a WaitCallback delegate to synchronize the threads.D Call the Sleep method of threadOne. E Call the SpinLock method of threadOne.

多选题The multithreaded agent architecture for heterogeneous services is similar to the Oracle multithreaded server architecture. The principal difference is that it used threads instead of processes.  What are thee kinds of threads that it uses?()ATCPBTaskCMonitorDDispatcherEShared ServerFShutdown address

多选题Which two statements are true?()AIt is possible for more than two threads to deadlock at once.BThe JVM implementation guarantees that multiple threads cannot enter into a deadlocked state.CDeadlocked threads release once their sleep() method’s sleep duration has expired.DDeadlocking can occur only when the wait(), notify(), and notifyAll() methods are used incorrectly.EIt is possible for a single-threaded application to deadlock if synchronized blocks are used incorrectly.FIf a piece of code is capable of deadlocking, you cannot eliminate the possibility ofdeadlocking by insertinginvocations of Thread.yield().

单选题A customer needs to ensure that the number of threads servicing an application does not exceed the number of database connections available to the application. What step must you take to address this situation?()AConfigure a Max Threads Constraint and add your application to the list of applications for the  Constraint.BConfigure a Work Manager with a Maximum Threads Constraint tied to the Connection Pool and  configuration your application to use the Work Manager.CConfigure a Work Manager with a Minimum Threads Constraint tied to the Connection Pool and  configure your application to use the Work Manager.DConfigure a global MaxThreads constraint and target it to the server or clusters where your  application is deployed.EConfigure the startup parameter -Dwls-maxThreads to be the same as the number of  database connections configured.

单选题Your company’s network has client computers that run Windows 7.   A software vendor releases version 2 of an application that your company uses.  Your company currently uses version 1.  Version 1 and version 2 are not compatible. You plan to deploy version 2 of the application.   You have the following requirements:Users must be able to run both versions of the application on their computers.   Version 2 must be available when a client computer is not connected to the network.  You need to plan a software deployment process that meets the requirements.   What should you do?()A Deploy version 2 of the application by using Microsoft Application Virtualization (App-V). B Deploy version 2 of the application as a Remote Desktop Services RemoteApp.C Deploy version 2 of the application by using a Group Policy Software Installation policy.D Deploy version 2 of the application by using a Microsoft System Center Configuration Manager package.