首页/ 题库 / [单选题]The(72)turns the sou的答案

The(72)turns the source file into an object file and the(73)turns the object file into an executable file.

单选题
2022-07-12 02:15
A、translator
B、compiler
C、interpreter
D、linker
查看答案

正确答案
B

试题解析
解析:译文:编译程序将源文件转换成目标文件,连接程序将目标文件转换成可执行文件。

标签:
感兴趣题目
Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1()。
You have a Windows image (WIM) file that contains an image of Windows 7. The WIM file is 2 GB. Youneed to ensure that you can copy the image to CD.  What should you do?()
Which line of code marks the earliest point that an object referenced by intObj becomes a candidate for garbage collection?()

You are deploying a Web site to a server managed by a hosting company. The only access you have to the server is through FTP. You need to precompile and deploy the Web site without its source files.
What should you do? ()

●Traditional structured analysis techniques focus upon the flow of(71)within a system Object-oriented analysis emphasizes the building of real-world models It examines requirements from the perspective of the classes and objects found in the vocabulary of the(72)domain
The(72)turns the source file into an object file and the(73)turns the object file into an executable file.

You are the network administrator for The network contains a Windows Server 2003 compter named TestKing1. TestKing1 functions as a file server.
Six users in the accounting department use an accounting software application to open files that are stored in a shared folder on TestKing1. The users keep these files open for an extended period of time.
You need to restart TestKing1. You need to find out if any files on Testking1 are open before you restart the computer.
What should you do?()

You are installing a new deployment of the Junos Pulse Access Control Service. You have an existing RADIUS server that has a populated user file. You are considering using the RADIUS proxy feature.Which consideration must you take into account?()

You develop a serializable class for persisting objects as files.
Every time an object is serialized, you have to update the database with the name of the object and location of that file.
You elect to employ the OnSerialized attribute to achieve this objective.
You now need to apply the OnSerialized attribute to a certain method.
What should you do?()

You are deploying a Web site to a server managed by a hosting company. The only access you have to the server is through FTP. You need to precompile and deploy the Web site without its source files. What should you do? ()
(72)is a client/server protocol for transferring files across the Internet.

You are using Recovery Manager (RMAN) with a recovery catalog to back up your production database. Thebackups and the archived redo log files are copied to a tape drive on a daily basis.
Because of media failure,you lost your production database completely along with the recovery catalog database.You want to recover the target database and make it functional. You consider performing the following steps to accomplish the task:
1) Restore an autobackup of the server parameter file.
2) Restore the control file
3) Start the target database instance
4) Mount the database
5) Restore the data files
6) Open the database with RESETLOGS option
7) Recover the data files
8) Set DBID for the target database
Which option illustrates the correct sequence that you must use?()

相关题目
In a civil case, one party may file an action, the other party may or may not ____ the claim.
The blizzard (暴风雪) moved south,turning into an icy rain that ________ the airports for three days
The(72) is the primary device for entering information into the computer.
The most common source of excitation for synchronous motors is a/an ().
What command would an operator use to move a file from the /old_dir directory to the /new_dir directory without changing the file name?()
Your Windows 2000 Professional computer contains a single hard disk configured as a single partition.You want to move a folder named Sales under a folder named Corp on your computer.You want the files in the Sales folder to remain compressed after moving the folder. You want the files in the Corp folder to remain uncompressed. You want to ensure that the files are recoverable in case of any disk problems. You also want to move the files with the least amount of administrative effort.What should you do?
With respect to a computer file system, an access control list (ACL) is a list of permissions attached to an object. Which of the following makes forwarding decisions in hardware?()

Files /tmp/file2 and /tmp/file3 are hard linked to /tmp/file1.
What will the result be if a user makes changes to /tmp/file2 at the same time another user tries to delete /tmp/file1?()

An antivirus program (1) a virus by searching code recognized as that of one of the thousands of viruses known to afflict computer systems. An antivirus Program also can be used to create a checksum for (2) files on your disk, save the checksums in a special file, and then use the checksums to (3) whether files have been modified perhaps by a new virus. Special terminate and stay resident (TSR) programs can check for unusual (4) to access vital disk areas and system f11es, and check files you copy into memory to be sure they are not (5) .

You are the network administrator for TestKing. The network contains a Windows
Server 2003 computer named testking1, which hosts a critical business application
named Salesapp. Testking1 has one disk that contains a single NTFS volume.
Five days ago, the System State of testking1 was backed up, and an Automated
System Recovery (ASR) backup was created. No additional backups were
performed. Subsequently, many changes were made to the Salesapp data files.
You apply an update to the application, which requires you to restart testking1.
Windows startup terminates with a Stop error. You restart the computer and boot
to a floppy disk. A utility on this disk gives you read-only access to the NTFS file
system. You discover that one of the .dll files for the Salesapp application is
corrupted. The corrupted file is stored in the C.\Windows\System32 folder.
You need to restore the corrupted file. You need to avoid losing any changes made
to the data files on testking1.
What should you do onTestKing1?()

You are the network administrator for You administer a Windows Server 2003 computer named TestKing2. contains a shared folder named TestKingProjects. You use the Backup utility once each day to back up the TestKingProjects folder.
You discover that a database file in the TestKingProjects folder is corrupt. You confirm that the file corruption is not the result of a virus. You need to replace the corrupted file by using the latest backup. You do not know whether the file was corrupted before or after the latest backup was completed.
You need to verify that the file in the backup can be opened successfully before you overwrite the existing file.
What should you do?()

The document management of information system engineering supervision is an important work, among them, information the () is a general class file.
You need to read the entire contents of a file named Message.txt into a single string variable.Which code segment should you use?()
● The (72) has several major components, including the system kernel, a memory management system, the file system manager, device drivers, and the system libraries.(72)
The(72)has several major components, including the system kernel, a memory management system, the file system manager, device drivers, and the system libraries.
A file on the system ahs been lost, but the latest version is on a mksysb tape. The file is extracted from this mksysb tape by loading the tape. Which of the following indicates where the tape will be skipped forward?()
A system administrator has an existing mksysb image, but would like to modify the image.data file on the mksysb before installing it on a system. Which of the following procedures is most appropriate to perform?()
A host on the LAN is accessing an FTP server across the Internet. Which of the following addresses could appear as a source address for the packets forwarded by the router to the destination server()。
You are the network administrator for Ezonexam.com. Your network has 210 Windows 2000 Professional computers and eleven Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Sandra leaves Ezonexam.com. You decrypt the files for her manager. When the manager attempts to open any of the files, he receives the following error message: "Access is denied."
You are the network administrator for ExamSheet.net. Your network has 210 Windows 2000 Professional computers and eleven Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Sandra leaves ExamSheet.net. You decrypt the files for her manager. When the manager attempts to open any of the files, he receives the following error message: "Access is denied." You want the manager to be able to access the files.  What should do? ()
广告位招租WX:84302438

免费的网站请分享给朋友吧