-
One of the disadvantages of using carbon dioxide to extinguish a fire in an enclosed space is ().
A . the "snow" which is sometimes discharged along with the gas is toxic
B . prolonged exposure to high concentrations of C0
gas causes suffocation
C . rapid dissipation of the C0
vapor
D . the C0
gas is lighter than air and a large amount is required to extinguisha fire near the deck
-
What is one benefit of using the IBM eConfig configuration tool?()
A . It warns users of parts availability constraints.
B . It provides a record of discounts used in the past.
C . It optimizes the adapter selection based on function and cost.
D . It provides validation of acceptable combinations of components.
-
Moving data is one of the most common causes of planned downtime. For which of the followingpurposes might the data migration function of the SAN Volume Controller be used?()
A . when replacing an SVC node due to a failure
B . when migrating from a Windows OS to a Linux OS
C . when replacing older storage with newer storage
D . when performing a firmware upgrade on the SVC console
-
One method of reducing the length of radio transmissions without distorting the meaning of your words is by using().
A . slang
B . secret codes
C . procedure words
D . analogie
-
A class games.cards.Poker is correctly defined in the jar file Poker.jar. A user wants to execute the main method of Poker on a UNIX system using the command:java games.cards. Poker What allows the user to do this?()
A . put Poker.jar in directory /stuff/java, and set the CLASSPATH to include /stuff/java
B . put Poker.jar in directory /stuff/java, and set the CLASSPATH to include /stuff/java/*.jar
C . put Poker.jar in directory /stuff/java, and set the CLASSPATH to include /stuff/java/Poker.jar
D . put Poker.jar in directory /stuff/java/games/cards, and set the CLASSPATH to include /stuff/java
-
which one of the following is an @fuction that Lonnie can use to return the value from a specific field?()
A . @value
B . @getfield
C . @GetItemVale
D . @getfieldvalue
-
Since HTTP is one of the most common protocols used in the internet, what should be done at a firewall level to ensure thatthe protocol is being used correctly? ()
A . Ensure that a stateful firewall allows only HTTP traffic destined for valid web server IP addresses.
B . Ensure that a firewall has SYN flood and DDoS protection applied specifically for valid web servers.
C . Ensure that your firewall enforces HTTP protocol compliance to ensure that only valid flows are allowed inand outof your network.
D . Ensure that HTTP is always authenticated.
E . Ensure that your web server is in a different zone than your backend servers such as SQL and DNS.
-
One of the advantages in the use of a dry liner over a wet liner is()
A . it is fitted with neoprene O-ring seals
B . the honing process makes it easier to maintain the desired oil film
C . there is likelihood of water leaking into the combustion space
D . it fits more loosely due to a decrease in heat transfer through the composite wall
-
Because the timing of injection is crucial, () mounted on the camshaft, which is driven by the crankshaft are used to operate the fuel pumps, one of which is provided for each cylinder.
A . gears
B . rams
C . barrels
D . cam
-
Hot gas bypass is one of the methods used to ()
A . relieve excessive compressor head pressure
B . produce flash gas at the expansion valve
C . reduce flooding of the receiver at low load
D . defrost the evaporator coil
-
One advantage of dry cylinder liners used in a diesel engine is the()
A . lower thermal expansion rates than wet liners
B . greater heat transfer rate than wet liners
C . greater wear resistance than wet liners
D . procedure to replace dry liners is simpler than for wet liner
-
What term is used to describe the process where one frame is placed into a different type of frame?()
A . Framing
B . De-encapsulation
C . Encapsulation
D . De-framing
E . None of the above
-
A class games.cards.Poker is correctly defined in the jar file Poker.jar. A user wants to execute the main method of Poker on a UNIX system using the command: java games.cards.Poker What allows the user to do this?()
A . put Poker.jar in directory /stuff/java, and set the CLASSPATH to include /stuff/java
B . put Poker.jar in directory /stuff/java, and set the CLASSPATH to include /stuff/java/*.jar
C . Put Poker.jar in directory /stuff/java, and set the CLASSPATH to include /stuff/java/Poker.jar
D . put Poker.jar in directory /stuff/java/games/cards, and set the CLASSPATH to include /stuff/java
E . put Poker.jar in directory /stuff/java/games/cards, and set the CLASSPATH to include /stuffijava/*.jar
F . put Poker.jar in directory /stuff/java/games/cards, and set the CLASSPATH to include /stuff/java/Poker.jar
-
In MPLS traffic engineering, which one of the following protocols is used for Path Setup?()
A . BGP
B . OSPF
C . ISIS
D . RSVP
-
He is one of the best players in the game,____?
-
Which of the following is NOT one of the purposes of using nonverbal communication?
-
Identify Which sentences use the rhetorical device of antithesis.2. There is only one good, that is knowledge; there is only one evil, that is ignorance.
-
Which one of the following idioms is used to describe a good weather for agriculture?
-
Which of the following is NOT one strategy used by Americans to accept a compliment?
-
Which of the following is one of the four consumer perception dimensions used by ad agency Young & Rubicam to measure brand strength?
A.brand conformance
B.brand consistency
C.brand convenience
D.brand extension
E.brand relevance
-
It is right to say “No one hold to blame for the loss of the game; each had done her
是
否
-
One advantage of dry cylinder liners used in a diesel engine is the_________.
A.lower thermal expansion rates than wet liners
B.greater heat transfer rate than wet liners
C.greater wear resistance than wet liners
D.procedure to replace dry liners is simpler than for wet liners
-
The two games have some similar(). Both games use a use that is().
A.spots,round
B.character,round
C.chracteristics, round
D.spots,together
-
A system using Discretionary Access Control (DAC) is vulnerable to which one of the fo
A.Trojan horse
B.Phreaking
C.Spoofing
D.SYN flood