Maximum memory
Maximum processor speed
Maximum number of PCI slots
Maximum number of partitions
第1题:
Input data from keyboard are stored in(71) for processing.
A.modem
B.bus
C.memory
D.printer
第2题:
Note: Make(67)regularly in data processing.
A.edit
B.insert
C.format
D.Backup
第3题:
●Note:Make (72) regularly in data processing.
(72) A.edit
B.insert
C.format
D.Back up
第4题:
() .is a term for data sets that are so large or complex that traditional data processing applications are inadequate Challenges include analysis, capture, data ?curation, search, sharing, storage,transfer,visualization, querying, updating and information privacy.
A.Data market'
B.Data warehouse
C.Big data
D.BI
第5题:
( )is a trem for data sets that are so large or complex that traditional data processing applications are inadequate. Challenges include analysis, capture . data curation. Search. Sharing. Storage . transfer. Visualization . querying updating and information privacy
A.Data market
B.Data varehouse
C.Big data
D.BI
第6题:
Is a programming model and an associated implementation for processing and generating big data sets with a parallel, distributed algorithm on a cluster.The model is a specialization of the split-apply-combine strategy for data analysis().
A.HDFS
B.Chukwa
C.MapReduce
D.HBase
第7题:
method is the use of a data processing system to represent selected behavioral(67)of a physical or abstract system. For example, the representation of air streams around airfoils at various velocities, temperatures, and air pressures with such a system.Emulation method is slightly different, it uses a data processing system to imitate another data processing system, so that the imitating system accepts the same data, executes the same programs, and achieves the same(68) as the imitated system. Emulation is usually achieved(69) hardware or firmware. In a network, for example, microcomputers might emulate terminals(70) communicate with mainframe.
A.Assembly
B.Simultaneity
C.Fraud
D.Simulation
第8题:
Is a massive volume of structured and unsteuctured data so large it is difficult to process using traditional database or software technique( ).
A.Data Processing system
B.Big Data
C.Data warehouse
D.DBMS
第9题:
You are the administrator of a SQL Server 2000 computer. The server contains your company's order processing database. Two-hundred operators take orders by telephone 24 hours a day. Threehundred data entry personnel enter data from orders received by mail.
To ensure that order data will not be lost, your company's disaster recovery policy requires that backups be written to tape. Copies of these tapes must be stored at an off-site company location. Orders must be entered into the database before they can be filled. If the server fails, you must be able to recover the order data as quickly as possible.
You need to create a backup strategy that meets the company requirements and minimizes server workload. Which two actions should you take? (Each correct answer represents part of the solution. Choose two.)
A.Perform. a combination of full database and filegroup backups.
B.Perform. a combination of full database and file backups.
C.Perform. a combination of full database, differential, and transaction log backups.
D.Back up the data to a local tape drive.
E.Back up the data to a network share, and then use enterprise backup software to write the disk backups to tape.
第10题:
program propagates itself by modifying other programs to include a possibly changed copy of itself and that is executed when the infected program is(67). A virus often causes damage or annoyance and may be triggered by some event such as the occurrence of a predetermined date.Worm is a self-contained program that can propagate itself through data processing systems or computer networks. Worms are often designed by hackers to use up(68) resources such as storage space or processing time.Trojan horse implies by the name an apparently harmless program containing(69) logic that allows the unauthorized collection, falsification or destruction of data. Logic bomb causes damage to a data processing system when triggered by some specific system condition. Time bomb is also a malicious program being activated at a(70) time.
A.Worm
B.Virus
C.Disaster
D.Demon