-
The Database Resource Manager is automatically enabled in the maintenance window that runs the Automated Maintenance Task. What is the reason for this?()
A . to prevent the creation of an excessive number of scheduler job classes
B . to allow the Automated Maintenance Tasks to use system resources without any restriction
C . to allow resource sharing only among the Automated Maintenance Tasks in the maintenance window
D . to prevent the Automated Maintenance Tasks from consuming excessive amounts of system resource
-
Which of the following is operated from the main engine room console on an automated vessel?()
A . Fire pump and lube oil pump
B . Lube oil pump and distilling plant
C . Distilling plant and shaft alley door
D . Shaft alley door and fixed CO2 release
-
Which of the following is required to ensure the completion of all tests within the automated procedure of thecluster test tool?()
A . Application monitoring has been configured
B . Only disk heartbeat networks have been used
C . Cluster nodes are attached to two IP networks
D . Resource Group dependencies have been configured
-
The Database Resource Manager is automatically enabled in the maintenance window that runs the Automated Maintenance Task. What is the reason for this?()
A . to prevent the creation of an excessive number of scheduler job classes
B . to allow the Automated Maintenance Tasks to use system resources without any restriction
C . to allow resource sharing only among the Automated Maintenance Tasks in the maintenance window
D . to prevent the Automated Maintenance Tasks from consuming excessive amounts of system resource
-
Loop guard and UniDirectional Link Detection both protect against Layer 2 STP loops. In which two ways does loop guard differ from UDLD in loop detection and prevention? ()
A . Loop guard can be used with root guard simultaneously on the same port on the same VLAN while UDLD cannot
B . UDLD protects against STP failures caused by cabling problems that create one-way links.
C . Loop guard detects and protects against duplicate packets being received and transmitted on different ports
D . UDLD protects against unidirectional cabling problems on copper and fiber media.
E . Loop guard protects against STP failures caused by problems that result in the loss of BPDUs from a designated switch port.
-
The coordinated broadcast and automated reception of MSI via the INMARSAT EGC system using English to meet the requirements of the SOLAS Convention:().
A . international NAVTEX Service
B . FleetNET Service
C . SafetyNet Service
D . WWNWS
-
The network administrator has enabled BPDU guard on the LAN. Why is an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of this network? ()
A . BPDU guard can be used to prevent invalid BPDUs from propagating throughout the network.
B . BPDU guard can guarantee proper selection of the root bridge.
C . BPDU guard can be utilized to prevent the switch from transmitteing BPDUs and incorrectly altering the root bridge election.
D . BPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the port.
E . None of the other alternatives apply
-
For delay sensitive traffic, what are the three best ways that are used to prevent packet loss? ()
A . Compress payload.
B . Use header compression.
C . Increase link capacity.
D . Use random early detection.
E . Guarantee bandwidth to fragile flows.
F . Implement network-based application recognition.
-
In your Database, the TBS PERCENT USED parameter is set to 60 and the TBS PERCENT FREE parameter is set to 20. Which two storage-tiering actions might be automated when using information Lifecycle Management (ILM) to automate data movement?()
A . The movement of all segments to a target tablespace with a higher degree of compression, on a different storage tier, when the source tablespace exceeds TBS PERCENT USED
B . Setting the target tablespace to read-only
C . The movement of some segments to a target tablespace with a higher degree of compression, on a different storage tier, when the source tablespace exceeds TBS PERCENT USED
D . Setting the target tablespace offline
E . The movement of some blocks to a target tablespace with a lower degree of compression, on a different storage tier, when the source tablespace exceeds TBS PERCENT USED
-
Loop guard and UniDirectional Link Detection both protect against Layer 2 STP loops. In which two ways does loop guard differ from UDLD in loop detection and prevention?()
A . Loop guard can be used with root guard simultaneously on the same port on the same VLAN while UDLD cannot.
B . UDLD protects against STP failures caused by cabling problems that create one-way links.
C . Loop guard detects and protects against duplicate packets being received and transmitted on different ports.
D . UDLD protects against unidirectional cabling problems on copper and fiber media.
E . Loop guard protects against STP failures caused by problems that result in the loss of BPDUs from a designated switch port.
-
Which tasks are run automatically as part of the Automated Maintenance Task by default?()
A . Segment Advisor
B . SQL Access Advisor
C . Optimizer statistics gathering
D . Automatic SQL Tuning Advisor
E . Automatic Database Diagnostics Monitor
-
Which tasks are run automatically as part of the Automated Maintenance Task by default?()
A . Segment Advisor
B . SQL Access Advisor
C . Optimizer statistics gathering
D . Automatic SQL Tuning Advisor
E . Automatic Database Diagnostics Monitor
-
Factory Automation (FA) is becoming the developing trend of factories.
-
The first Automated Teller Machine (ATM) was used by?
-
The Economist recently detailed the ways in which our rapidly shifting professional situation — the disruptive () power of automation, the increasing number of jobs _________ expertise — necessitates
A.requiring
B.rewarding
C.investigating
-
Not until the 1980's______in Beijing start to find ways to prevent historic buildings from destruction.
A.some concerned citizens
B.some concerning citizens
C.did some concerning citizens
D.did some concerned citizens
-
is one way to prevent(防止) the strong sunshine in Bangkok.A.Wearing a hatB.Staying in the
is one way to prevent(防止) the strong sunshine in Bangkok.
A.Wearing a hat
B.Staying in the forests
C.Climbing up the mountains
-
New ways have been found to prevent the fiver__________
A.not to be polluted
B.against polluting
C.from polluting
D.from being polluted
-
The key to attaining office automation ties in being equipped with a wide variety of
是
否
-
From the author's point of view, the best way to prevent oil spills is to get rid of oil completely.
A.Y
B.N
C.NG
-
When automation is introduced into the factory,all the work done by hand will_____the assembly line.
A.give way to
B.take the place of
C.have a say in
D.be contributed to
-
As an increasing number of traffic regulation schemes are ______ , the poor bewildered driver finds himself diverted and forced into one way systems which cause even greater delays that the traffic jams they are supposed to prevent.
A.composed
B.devised
C.designed
D.delivered
-
Which is Not mentioned as a way to prevent chronic-disease deaths?
A. timely medical treatment
B. healthy eating
C. more physical activity
D. reduction in drinking and smoking
-
You are the administrator of a Junos Pulse Access Control Service implementation. You must restrict authenticated users connected from the branch offices to a few specific resources within the data center. However, when the authenticated users are connected at the corporate office, they are allowed more access to the data center resources.You have created two roles with different levels of access and are trying to determine the best way of controlling when a user is mapped to a specific role. Having the user prompted to manually select their role is possible, but you want to automate the process.Which configuration solves this problem?()
A. Implement a RADIUS request attribute policy to assist with realm selection and create different role-mapping rules for the user in each realm.
B. Implement a directory/attribute server on the realm and set up this server to determine by group membership the proper role to which a user should be mapped.
C. Reorder the role-mapping rules to allow for the more open role to be mapped first and then enable the "stop processing rules when this rule matches" function on this role.
D. Implement a Host Checker policy on the realm that determines the geographic location of the device and restricts the user based on the results of the policy.