更多"When the adjacency matrix method is"的相关试题:
[单项选择]When the adjacency matrix method is used to store a graph, which of the statements is (are) true ( ) Ⅰ.the space required depends on the number of vertices Ⅱ.the apace required depends on the number of edges
A. None
B. Ⅰ only
C. Ⅱ only
D. Ⅰ and Ⅱ
[单项选择]When the adjacency list method is used to store a graph, which of the statements is (are) true ( )
A. None
B. Ⅰ only
C. Ⅱ only
D. Ⅰ and Ⅱ
[单项选择]Which install method should be used to recycle an LPAR without retaining any information from its original configuration?()
A. Migration
B. Preservation
C. New and Complete Overwrite
D. Alternate disk installation
[单项选择]Which method should be used to dynamically elect an RP when your network is using PIM version1?()
A. auto-RP
B. static RP
C. discovery mode
D. bootstrap protocol
[单项选择]The Grammar-Translation Method was first used in the teaching of______.
A. French
B. Latin and Greek
C. English
D. English and French
[单项选择]When used in criminal investigation, DNA fingerprinting requires ______.
[单项选择]Which of the following channels, when used in close proximity to one another, provide the BESTprotection against crosstalk?()
A. 1 and 11
B. 2 and 10
C. 6 and 1
D. 6 and 11
[单项选择]What protection method is used in 4F BLSR networks?()
A. Each fiber has half of its SONET capacity reserved for protection.
B. Two fibers in the span carry working traffic, while the other two fibers in the span are reserved for protection.
C. The signal is sent simultaneously in both directions around the ring. The receiver determines which fiber to listen to based on signal quality.
D. The signal is sent simultaneously in both directions around the ring. The transmitter determines which fiber has the working bit set for the receiver to acknowledge.
[单项选择]Which command reveals the last method used to powercycle a router?()
A. show reload
B. show boot
C. show running-config
D. show version
[单项选择]In the Direct Method, the most frequently used techniques of consolidation are dictation, purposeful tasks and______.
A. free composition
B. guided composition
C. graded composition
D. oral practice
[单项选择]I was so ______ when I used the automatic checkout lane in the supermarket for the first time.
A. immersed
B. assaulted
C. thrilled
D. dedicated
[单项选择]Which IPsec security protocol should be used when confidentiality is required?()
A. AH
B. MD5
C. PSK
D. ESP
[单项选择]He is ______ fatter than he was when I used to know him.
A. considerate
B. considerable
C. considerably
D. considerately
[单项选择]According to the passage, when stamps were used, the postage would be ______ that in the early 19th century.
[多项选择]Which two commands may be used when configuring an IP address for a Gigabit Ethernet interface?()
A. set interfaces ge-0/0/0.0 address 10.1.1.1/24
B. set interfaces ge-0/0/0.0 family inet address 10.1.1.1/24
C. set interfaces ge-0/0/0 unit 0 family inet address 10.1.1.1/24
D. set interfaces ge-0/0/0 address 10.1.1.1/24