首页/ 题库 / [单选题]A data( )is a file t的答案

A data( )is a file that contains metadata—that is,data about data.

单选题
2022-01-04 07:11
A、structure
B、table
C、base
D、dictionary
查看答案

正确答案
D

试题解析
解析:数据字典就是包含元数据的文件,即关于数据的数据。

标签:
感兴趣题目
A vessel’s quarter is that section which is().
You are on a containership carrying a tank container that had been filled with sodium hydroxide solution. The container is empty but has not been cleaned. Which,if any,placard is required?().
A shore is a piece of securing dunnage that().
The most obvious characteristics of the Communicative Approach is that almost everything that is done is done with a communicative intent.()
Which OSI layer header contains the address of a destination host that is on another network?
Given that t1 is a reference to a live thread, which is true?()
A host is attempting to send data to another host on a different network. What is the first action that the sending host will take?()
()is a term that covers a great variety of goods that must be loaded individually,and not in intermodal container nor in bulk as with oil or grain.
You have a Windows image (WIM) file that contains an image of Windows 7. The WIM file is 2 GB. Youneed to ensure that you can copy the image to CD.  What should you do?()

You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24 hours. You save the capture file as data.cap. You find that the size of the file is more than 1 GB. You need to create a file named DNSdata.cap from the existing capture file that contains only DNS-related data.
What should you do? ()

You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft network monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24hours. You save the capture file as data.cap. you find that the size of this file is more than 1GB. You need to create a file named DNSdata.cap from the existing capture file that contains only DNS –related data what should you do?()
rogram propagates itself by modifying other programs to include a possibly changed copy of itself and that is executed when the infected program is(67). A virus often causes damage or annoyance and may be triggered by some event such as the occurrence of a predetermined date.Worm is a self-contained program that can propagate itself through data processing systems or computer networks. Worms are often designed by hackers to use up(68) resources such as storage space or processing time.Trojan horse implies by the name an apparently harmless program containing(69) logic that allows the unauthorized collection, falsification or destruction of data. Logic bomb causes damage to a data processing system when triggered by some specific system condition. Time bomb is also a malicious program being activated at a(70) time.
相关题目

A collection of related data that is the electronic equivalent of a file cabinet.

A word is a symbol that _____ . [ ]
A: Hello, is that Paul White? B: No, this is John.
A monomorphemic word is a word that consists of a single ( )morpheme.
A common occurrence when a vessel is running into shallow water is that().
The most obvious characteristics of the Communicative Approach is that almost everything that is done is done with a communicative intent.()
On a ship,a door that is required to be marked KEEP CLOSED is designed to().
A section of the river that is narrower than usual and is often navigable from bank to bank is a().
A data( )is a file that contains metadata—that is,data about data.
A flashing light is a light that().
A variable star is one that().
● A(75) is a device that enables data from one computer to travel to another computer by using telephone lines.
Password is a(n)(71)series of characters that enables a user(72)a file, computer or program. On multi - user systems,(73)user must enter his or her password(74)the computer will respond to commands. The password helps ensure that unauthorized users do not access the computer. In addition, data files and programs may require a password.Ideally, the password should be something(75)could guess. In practice, most people choose a password that is easy to remember, such as their name or their initials. This is one reason it is relatively easy to break into most computer system.
A (72) is a file that contains metadata—that is,data about data.
A double star is a star that().
The passage implies that cellulose is a very porous substance because it contains______.
A shore is a piece of securing dunnage that().
A hook that will release quickly is a().
A double star is a star that().
You have taken a Logical Volume Manager (LVM) snapshot backup of a volume that contains the MySQL data directory. Why is it important to remove snapshots after completing a RAW backup in this way?()
广告位招租WX:84302438

免费的网站请分享给朋友吧