Users can define policy to control traffic flow between which two components?()
第1题:
On the Internet, users can share( )and communicate with each other.
A.process B.tasks C.resources D.documents
第2题:
A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel. Which users can be seen and what actions can be performed()
第3题:
WWW is popular for its multimedia transmission and friendly(71). Although the speed of network has been improved considerably in recent years, the rapid(72)of using the Internet, the inherited character of delay in the network and the Request/Response working mode of WWW still make the Internet traffic very(73)and give no guarantee on the Quality of Service. Because HTTP has no states, the web server cannot know the users' demand and the users' requests cannot be predicted Taking advantage of a cache mechanism and the time locality of WWW accesses, the browser can preserve the documents ever accessed in the local machine. By this means, for the documents in the local cache, the browser does not need to send the requests to the remote server or to receive the whole responses from the remote one Pre-fetching uses the space locality of accesses First, the users' access requests are predicted according to the users' current request. Secondly, the expected pages are fetched into the local cache when the user is brow sing the current page. Finally, the users can access these pages downloaded from the local cache. And this can reduce the access delay to some degrees. Pre-fetching is one kind of active caches that can cache the pages which are still not requested by the user. The application of pre-fetching technology in the web can greatly reduce the waiting time after users have sent their requests. This paper brings forward an intelligent technique of web pre-fetching, which can speed up fetching web pages. In this technique, we use a simplified WWW data model to represent the data in the cache of web browser to mine the association rules. We store these rules in a knowledge base so as to(74)the user's actions. In the client sides, the agents are responsible for mining the users' interest and pre-fetching the web pages, which are based on the interest association repository. Therefore it is(75)for the users to speed up the browsing.
A.interactive
B.interaction
C.interactivity
D.infection
第4题:
Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()
第5题:
Which of the following network protocols is needed to ensure that users can type in a FQDN instead of the IP address?()
第6题:
Which of the following is true about the following share access properties? ()
第7题:
Which of the following is true regarding NetWare Directory Services (NDS) configuration?()
第8题:
A. Users authenticated to one Junos Pulse Access Control Service can transparently access resources protected by another Junos Pulse Access Control Service.
B. Users authenticated to a Junos Pulse Access Control Service can transparently access resources protected by a Junos Pulse Secure Access Service.
C. Remote access users authenticated to a Junos Pulse Secure Access Service can transparently access resources protected by a Junos Pulse Access Control Service.
D. Remote access users authenticated to one Junos Pulse Secure Access Service can transparently access resources protected by another Junos Pulse Secure Access Service.
第9题:
Which of the following roles can use the Organization Administration Console to create and modify users in their organization?()
第10题:
You are unable to move the Unified Job Scheduler occupant from the SYSAUX tablespace to the USERS tablespace. What could be the reason?()