A.双重处理
B.多重处理
C.多任务处理
D.多线程
您可能感兴趣的试卷
你可能感兴趣的试题
A.写入所有内存DIMM和L1缓存中的数据分布
B.写入某内存库(memory bank)中所有内存DIMM中的数据分布
C.写入所有内存DIMM和处理器中的数据分布
D.写入所有内存DIMM和L2缓存中的数据分布
A.增加RAM量
B.使用低压电源
C.添加硬件防火墙
D.安装冗余网卡
A.插座大小不符
B.缓存来自于其它供应商
C.处理器不匹配
D.无法在部署服务器后对处理器升级
A.UID开关
B.电源开关
C.冷却风扇开关
D.机箱防盗开关
A.购买硬件前
B.安装前
C.安装驱动程序时
D.安装后
A.第二台调制解调器
B.第二个CPU
C.第二个HBA
D.第二张PBX卡
A.RISC
B.多核
C.对称多重处理
D.Hyper-V
A.被动/主动
B.主动/被动
C.被动/被动
D.主动/主动
A.磁带库
B.NAS
C.光学记录库
D.SAN
A.远程用户。
B.帐户操作员。
C.服务器操作员。
D.备份操作员。
最新试题
Which of the following statements is true about L1 cache?()
Which of the following is the FIRST thing to consider when designing an email retention policy?()
Which of the following is the FIRST course of action before implementing a change to a server?()
There is a power outage and all servers are shut down properly by the uninterruptible power supply(UPS) software. When one of the servers starts up it displays a logical drive failed error. This server has two processors,16GB of memory, and a RAID 5 array with 10 drives. Which of the following is the MOST likely cause?()
An administrator will replace five current servers. Which of the following is the MOST important to review before installing new servers?()
A Windows 2003 Server is no longer able to access its internal SCSI drive. The cables areconnected, the drive has power, and the drive shows up in Device Manager; however, the My Computerwindow does not show the drive that was previously working and formatted with NTFS. Which of thefollowing would be the FIRST step in regaining access to the drive? ()
Which of the following are types of biometric devices used in server rooms? ()
Which of the following is MOST important to include on the disaster recovery documentation?()
A Windows 2003 Server is no longer able to access its internal SCSI drive. The cables areconnected, the drive has power, and the drive shows up in Device Manager; however, the My Computerwindow does not show the drive that was previously working and formatted with NTFS. Which of the following would be the FIRST step in regaining access to the drive? ()
Which of the following is a way to protect server operating systems from a short term contractor?()