-
What IBM resource is a search engine used to match hardware and software requirements to help you maximize your sales opportunities? ()
A . IBM Solutions and Options Guide
B . IBM Configuration and Options Guide
C . IBM Sizing Guides
D . IBM Server Prove
-
Which statement about Software Maintenance Upgrade is true?()
A . CRS-1 SMU can be applied to a different platform, and vice versa
B . SMU is an executable code for running a process or libraries that are shared between the different processes
C . SMUs for each release are individually downloadable from Cisco.com and come in the form of a tar ball
D . SMUs provide software fixes for critical network down and qualification blocking issues Therefore,every software defect has a corresponding SMU
E . SMUs are release-specific. If an issue affects multiple platforms or releases,an SMU is built separately for each release and each platform
-
An administrator wants to host several LPARs on a JS23 Blade server. To achieve this what additional management software is required?()
A . HMC
B . IVM
C . VIOS
D . IBM Director
-
On what metrics is Software Maintenance for AIX (SWMA) priced?()
A . Clock speed and memory capacity
B . AIX version and number of users
C . pSeries class and number of CPUs
D . pSeries model and number of LPAR
-
A system administrator has successfully backed up the VIOS software and is ready to perform a VIOS software update. Which command will the administrator use to update the software from a CD? ()
A . smit update_all
B . geninstall -d /dev/cd0 all
C . installp -acgX -d /dev/cd0 all
D . updateios -dev /dev/cd0 -accept -install
-
What is the appropriate EMC software to be compared with Tivoli Storage Productivity Center?()
A . PowerPath
B . VisualSAN
C . ControlCenter
D . Storage Essential
-
An administrator wants to host several LPARs on a JS23 Blade server. To achieve this what additional management software is required?()
A . HMC
B . IVM
C . VIOS
D . IBM Director
-
An administrator is attempting to update a software product. The install is interrupted by a system failure. Which of the following commands would be used to clean up the improperly applied filesets()
A . Ippchk -C
B . instfix -S
C . installp -c
D . installp -C
-
Fuel oil is thought to be one of the main factors () the operation and maintenance of an engine.
A . have nothing to do with
B . having nothing to do with
C . have much to do with
D . having much to do with
-
What will happen to associated preventive maintenance (PM) records when an asset is decommissioned?()
A . There is no automatic method to change the PM(s) status to INACTIVE
B . The PM(s) will become in INACTIVE if 'Change the Status of All Associated PM(s) to Inactive?' is checked while decommissioning the asset
C . The only way to change the status of the PM(s) to INACTIVE is to remove the assets from the PM(s) and then change the status of the PM(s) to INACTIVE
D . If the 'Change the Status of All Associated PM(s) to Inactive?' is not selected during decommissioning, the PM(s) status will remain ACTIVE; however, work order cannot be generated from the PM having a decommissioned asset
-
Which software-based security threat is typically spread from user to user via e-mail?()
A . Virus
B . Trojan horse
C . Denial of service
D . Data interceptio
-
An administrator wants to host several LPARs on a JS23 Blade server. To achieve this, what additional management software is required?()
A . HMC
B . IVM
C . VIOS
D . IBM Director
-
Cisco IOS XR software is partitioned into three planes: control, data, and management. Which three ofthese belong to the data plane?()
A . XML
B . RIB
C . FIB
D . QoS
E . PFI
-
Maintenance of charts and nautical publications up to date is a statutory requirement under the()Convention.
A、STCW
B、MARPOL
C、SOLAS
D、ISM
-
An AIX server will not boot in normal mode and the server must be booted into maintenance mode to rebuild the boot logical volume. A NIM master is not defined in this environment. How is the system booted into maintenance mode to perform this task ()
A . Apply power and when the SMS menus appear press 5 repeatedly to enter a maintenance boot automatically. The system will present a maintenance shell eventually.
B . Boot media such as CDROM or Tape is required to boot into maintenance mode. When inserted into the proper device the system automatically boots into maintenance mode when it can not boot into normal mode.
C . Apply power and the server automatically boots into maintenance mode where you can select your disk to rebuild the boot logical volume.
D . Boot media such as CDROM or Tape is required and an administrator must select the proper SMS menus to get into maintenance mode.
-
An administrator plans to apply a fix pack to the PowerHA software using a rolling migration. At what stage ofthe migration is a cluster verification supported?()
A . Individually before each node is upgraded
B . Individually before and after each node is upgraded
C . Individually after each node has been upgraded
D . Collectively after all nodes have been upgraded
-
An administrator wants to host several LPARs on a JS23 Blade server.To achieve this what additional management software is required?()
A . HMC
B . IVM
C . VIOS
D . IBM Director
-
Which DSL encapsulation method requires client software running on the end - user PC that is directly connected to a DSL modem?()
A . PPPoA
B . PPPoE
C . PPP
D . L2TP
E . ATM
-
One of the aims of CNC systems is to replace as much of the conventional NC software with hardware as possible
-
Machine maintenance is equivalent to machine repair.
-
Knowledge of both hardware and software is useful for anyone wanting to be professional in using computers.
-
Object-oriented software is specially helpful to______.
A.computer specialists
B.computer managers
C.nontechies
D.computer manufacturers
此题为多项选择题。
-
Internet piracy refers to the use of the Internet for illegally copying or distributing unauthorized software. In these cases the Internet is the medium for advertising, offering, acquiring, or distributing pirated software.
The Business Software Alliance, a software industry trade association, estimates that there are 840 000 Internet sites selling illegal software as genuine product. Many consumers Who acquire software over the Internet never receive the programs they paid for. Others are not able to get their money back if they discover that the software they acquired is counterfeit. Disreputable Internet businesses often quickly vanish, leaving behind hundreds of dissatisfied consumers.
The ease of creating a Website and then advertising and distributing software through the Internet has increased sales of pirated software passed off by seemingly legitimate businesses. Plus, the explosive growth of e-commerce, combined with anonymity (匿名) and unlimited volume, have made it even easier for criminals to sell counterfeit (伪造的) software online.
Illegal online businesses often have professional-looking Internet sites that could fool even the smartest consumer. Distinguishing counterfeit software on the Internet is understandably difficult because consumers can't visually examine the product for physical Warnings on the hard ware, or see the person from whom they're buying.
Pirated software can often contain viruses with the potential to damage both individual com puters or entire networks. Viruses can and do cause data loss, which would be devastating to most companies. When using unlicensed software, you are not eligible for technical support from the software publisher. If you have a technical issue in need of resolution, oftentimes a work stopping issue, you are out of luck. In addition, product upgrades (升级)—less expensive up grades of existing products—are not available to you.
Based on Business Software Alliance estimates, the current loss of jobs, wages, and critical investments in software and technology innovation worldwide due to piracy so far this year is estimated at: $11 326 675 282.
"Software piracy continues unabated (不减弱的), robbing the industry of thousands of jobs, billions in wages, tax revenues and critical investments in new technologies," according to Robert Holleyman, president and CEO, Business Software Alliance.
Internet piracy is defined as______.
A.selling pirated books over the Internet
B.stealing information from other Websites
C.copying or selling unauthorized software over the Internet
D.advertising and selling counterfeit products over the Internet
-
(翻译)1. SQL Server is designed to allow thousands of users to access the database at the same time and is a true client/server database system.2. An application software is any program designed to perf