-
You have a domain controller named Server1 that runs Windows Server 2008 R2. You need to determine the size of the Active Directory database on Server1. What should you do()
A . Run the Active Directory Sizer tool.
B . Run the Active Directory Diagnostics data collector set.
C . From Windows Explorer, view the properties of the %systemroot%\ntds\ntds.dit file.
D . From Windows Explorer, view the properties of the %systemroot%\sysvol\domain folder.
-
You have an Exchange Server 2010 organization.You need to determine why a remote SMTP server rejects e-mail sent from your organization.What should you do?()
A . Review the application event logs.
B . Review the message tracking logs.
C . Set the Protocol logging level to Verbose on the Receive connectors and then review the protocol log files.
D . Set the Protocol logging level to Verbose on the Send connectors and then review the protocol log files.
-
During the TDA, it is determined that Global Mirror will be implemented. The IBM team wants to ensure that they have enough DS8800 fiber links to handle the mirroring workload. Which tool should be used to determine the number of fiber links needed()
A . RMF Magic
B . Capacity Magic
C . Disk Magic
D . PerfMo
-
You have 100 segments in the USERS tablespace. You get an alert that the USERS tablespace is running low on space. You decide to shrink some segments. Which option would you use to determine which segments to shrink?()
A . Segment Advisor
B . SQL Tuning Advisor
C . SQL Access Advisor
D . Segment Resource Estimation
E . Automatic Database Diagnostic Monitor (ADDM)
-
You are underway in thick fog.You have not determined if risk of collision exists.Which statement is true?()
A . Your speed must be reduced to bare steerage ways
B . A look-out is not required if the radar is on
C . The radar should always be kept on a short-range scale
D . Fog signals are only required when a vessel is detected by radar
-
You have a domain controller named Server1 that runs Windows Server 2008 R2. You need to determine the size of the Active Directory database on Server1. What should you do()
A . Run the Active Directory Sizer tool.
B . Run the Active Directory Diagnostics data collector set.
C . From Windows Explorer, view the properties of the %systemroot%\ntds\ntds.dit file.
D . From Windows Explorer, view the properties of the %systemroot%\sysvol\domain folder.
-
You have a single Active Directory directory service domain. All servers run Windows Server 2003. You create several new Group Policies. You need to determine the end result of these Group Policies before applying the settings. What should you do?()
A . Use Resultant Set of Policy (RSoP) in Planning mode.
B . Use Resultant Set of Policy (RSoP) in Logging mode.
C . Use Event Viewer to view the system log.
D . Use Event Viewer to view the application log.
-
Following a grounding, you can best determine that a SLACK fuel oil tank has been holed by ().
A . sounding the tank
B . waiting for the vessel to list
C . examining tank boundaries
D . checking fuel oil strainer
-
You can determine that a C02 fire extinguisher is fully charged by().
A . looking at the gage
B . checking the nameplate data
C . weighing by hand
D . weighing on a properly calibrated scale
-
You have a computer that runs Windows 7. You need to view the processes that currently generate network activity. What should you do? ()
A . Open Resource Monitor and click the Network tab.
B . Open Windows Task Manager and click the Networking tab.
C . Open Event Viewer and examine the NetworkProfile Operational log.
D . Open Performance Monitor and add all the counters for network interface.
-
-That’s a beautiful dress you have on! -()
A . Oh,thanks.I got it yesterday
B . Sorry,it’s too cheap
C . You can have it
D . See you later
-
You have a computer that runs Windows 7. You need to view the processes that currently generate networkactivity. What should you do?()
A . Open Resource Monitor and click the Network tab.
B . Open Windows Task Manager and click the Networking tab.
C . Open Event Viewer and examine the NetworkProfile Operational log.
D . Open Performance Monitor and add all the counters for network interface.
-
You have a client computer that runs Windows 7. You need to identify which unsigned drivers have beeninstalled. Which command should you run?()
A . Cipher.exe /s.
B . Driverquery.exe /si.
C . Msinfo32.exe /q.
D . Pnputil.exe i.
-
In fog you observe your radar and determine that risk of collision exists with a vessel which is 2 miles off your port bow. You should().
A . stop your engines
B . sound the danger signal at two-minute intervals
C . hold course and speed until the other vessel is sighted
D . take avoiding action as soon as possible
-
Have you ever realized that attention___.your pronunciation?
-
If you have business idea, that means you have already started your business.
-
The first and most important step is to admit that you have doneeverything wrong. The first and most important step is to admit that you have doneeverything wrong. The first and most important step is to admit that you have done everything wrong.
-
—That's a beautiful dress you have on —()
—That&39;s a beautiful dress you have on —()
A.Oh,thanks.I got it yesterday.
B.Sorry,it's too cheap.
C.You can have it.
D.See you later.
-
If the benefits provided under a certain policy have a dollar limitation for each service, you should determine whether these limitations are realistic.
-
how many characteristics do you have that you don’t like ()
A.Few
B.Some
C.Many
-
- That's a beautiful dress you have on!- __________.
A.A.Oh,thanks. I got it yesterday
B.B.Sorry,it's too cheap
C.C.Hey you can have it
D.D.See you later
-
" You have put a bug in his ear" means that you have________.
A.made him laugh
B.shown concern for him
C.made fun of him
D.given him some kind of warning
此题为多项选择题。
-
Every time you try to answer a question that asks why, you engage in the process of causal analysis--you attempt to determine a cause or series of causes for a particular effect. When you try to answer a question that what if, you attempt to determine what effect will result from a particular cause. You will have frequent opportunity to use cause- and-effect analysis in the writing that you will do in college. For example, in history you might be asked to determine the causes of the Seven Day War between Egypt and Israel. In political science you might be asked to determine the reasons why Ronald Reagan won the 1984 Presidential election. And in sociology you might be asked to predict the effect that changes in Social Security legislation would have on senior citizens.
22. Determining causes and effects is usually thought-provoking and quite complex. One reason for this is that there are two types of causes: immediate causes, which are readily apparent because they are closest to the effect, and ultimate cause, which, being somewhat removed, are not so apparent and perhaps even hidden. Furthermore, ultimate causes may bring about effects which themselves become immediate causes, this creating a causal chain. For example, consider the following causal chain. Sally, a computer salesperson, prepared extensively for a meeting with an important client (ultimate cause), impressed the client (immediate cause), and made a very large sale (effect). The chain did not stop there: The large sale cause her to be promoted by her employer (effect).
A second reason why causal analysis can be so complex is that an effect may have any number of possible or actual causes, and a cause may have any number of possible or actual effects. 23. An upset stomach may be caused by eating spoiled food, but it may also be caused by overeating, flu, allergy, nervousness, pregnancy, or any combination of factors. Similarly, the high cost of electricity may have multiple effects: higher profits for utility companies, fewer sales of electrical appliances, higher prices for other products, and the development of alternative sources of energy. Sound reasoning and logic are central to any causal analysis. Writers of believable causal analysis examine their material objectively and develop their essays carefully. They are convinced by their own examination of the material, but are not afraid to admit other possible causes and effects.
Because people are accustomed to thinking of causes with their effects, they sometimes commit an error in logic known as the "after this, therefore because of this" fallacy. 24. This fallacy leads people to believe that because one event occurred after another event, the first event somehow caused the second. That is, they sometimes make causal connection that are not proved. For example, if students began to perform. better after a free breakfast program was instituted at their school, one could not assume that the improvement was caused by the breakfast program. There could of course be any number of other causes for this effect, and a responsible writer on the subject would analyze and consider them all before suggesting the cause.
(21)
-
You have been hungry after all that walking()
A.could
B.should
C.would
D.must