重要提示: 请勿将账号共享给其他人使用,违者账号将被封禁!
查看《购买须知》>>>
当前位置: 首页 > 远程教育 > 广东开放大学
网友您好, 请在下方输入框内输入要搜索的题目:
搜题

题目

[主观题]

file=open('users/yourname/desktop/file','w')file.write('helloworld!')这句代码的作用是()。

A.打开一个文件,不管文件在不在

B.打开文件并写入

C.在桌面上打开一个文件(路径得看个人具体情况),w的意思是,如果有则在文件里写入helloworld,如果没有则创建一个文件。

D.打开文件,没有报错

查看参考答案
更多“file=open('users/yourname/desktop/file','w')file.write('helloworld!')这句代码的作用是()。”相关的问题

第1题

You are the network administrator for The network contains a Windows Server 2003 compter n
amed TestKing1. TestKing1 functions as a file server.Six users in the accounting department use an accounting software application to open files that are stored in a shared folder on TestKing1. The users keep these files open for an extended period of time.You need to restart TestKing1. You need to find out if any files on Testking1 are open before you restart the computer.What should you do?()

A. Use Computer Management to view existing connections.

B. Use the netsend command to send a message to all domain members.

C. Use Task Manager to monitor processes started by all users.

D. Use System Monitor to monitor the Server object in Report view.

点击查看答案

第2题

Your production database is running in archivelog mode and you are using recovery manager
(RMAN) with recovery catalog to perform the database backup at regular intervals. When you attempt to restart the database instance after a regular maintenance task on Sunday, the database fails to open displaying the message that the data file belonging to the users tablespace are corrupted.The steps to recover the damaged data files are follows:1. Mount the database2. Open the database3. Recover the data file4. Restore the data file5. Make the data file offline6. Make the data file onlineWhich option identifies the correct sequence that you must use to recover the data files?()

A.2,4,3

B.1,4,3,2

C.2,5,4,3,6

D.5,2,4,3,6

E.1,5,4,3,6,2

点击查看答案

第3题

To accomplish user-managed backup for the USERS tablespace, you issued the following comma
nd to put the database in backup mode:SQL> ALTER TABLESPACE users BEGIN BACKUP;While copying the file to the backup destination a power outage caused the instance to terminate abnormally.Which statement is true about the next database startup and the USERS tablespace?()

A. The database will open, and the tablespace automatically comes out of the backup mode

B. The database will be mounted, and recovery must be performed on the USERS tablespace.

C. The database will be mounted, and data files in the USERS tablespace must be taken out of the backup mode.

D. The database will not be mounted, and you must restore all the data files for the USERS tablespace from the backup, and perform recovery.

点击查看答案

第4题

The network consists of a single domain named Ezonexam.com that includes 20 Windows NT wor
kstation 4.0 client computers. All other client computers are Windows 2000 Professional computers. You install Terminal Services on one of the Windows Server computers and Terminal Services Client on the 20 Windows NT Workstation 4.0 client computers. You create a system policy on the server that is configured as the terminal server. This system policy denies access to Network Neighborhood. You find that the users of the terminal server can still browse the network when they open My Network Places from Windows 2000 Professional computer or when they open Network Neighborhood from Windows NT Workstation 4.0 computers.

You want to prevent all users from browsing the network.

What should you do? (Each correct answer presents a complete solution. Choose two.)

A.Create a Windows Group Policy that denies user access to My Network Places.

B.Copy the Windows NT policy file to the 20 Windows NT Workstation 4.0 computers.

C.Create a Windows NT 4.0 default user policy on the Windows 2000 Server computer that is configured as the PDC emulator.

D.Modify the Windows NT policy template file so that you can restrict access to both My Network Places and Network Neighborhood. Save the policy file on the terminal server.

E.Configure the terminal server to use Application server mode. Select the Permissions compatible with Terminal Server 4.0 Users option.

点击查看答案

第5题

You are the network administrator for All network servers run Windows Server 2003.A file s
erver named TestKingSrvA has shadow copies enabled. One shared folder on TestKingSrvA has the configuration shown in the following table.While viewing a previous version of TestKingDocs, you open and edit Financials.xls.However, when you try to save the edited file, you receive the following error message:You need to save your changes to the previous version of Financials.xls. You must ensure that other users can continue to access current data on TestKingSrvA without interruption.What should you do?()

You are the network administrator for All network

You are the network administrator for All network

A. Copy the previous version of TestKingDocs to a separate location.

B. Restore the previous version of TestKingDocs to the default location.

C. Save Financials.xls in a separate location by using Microsoft Excel.

D. In the security properties of Financials.xls, assign the Allow - Modify permissions to the Everyone group.

点击查看答案

第6题

You are the administrator of a Windows 2000 Active Directory network. The network consists
of a single domain. The domain includes 20 Windows NT Workstation 4.0 client computers. All other client computers are Windows 2000 Professional computers.

You create a Windows NT 4.0 default user policy on the Windows 2000 Server computer that is configured as the PDC emulator. This default user policy denies access to Network Neighborhood. You then install Terminal Services on one of the servers and Terminal Services Client on the 20 Windows NT Workstation client computers.

You find that the users of the Terminal Server can still browse the network when they open My Network Places. You want to prevent all users from browsing the network.

What should you do?

A.Modify the Windows NT policy template file so that you can restrict access to both My Network Places and Network Neighborhood. Save the policy file on the Terminal Server.

B.Copy the Windows NT policy file to the 20 Windows NT Workstation computers.

C.Create a Windows 2000 Group Policy that denies user access to My Network Places.

D.Edit the local registry on the Windows NT Workstation computers to deny access to Entire Network in Network Neighborhood.

点击查看答案

第7题

You are a network administrator for Ezonexam.com's Windows 2000 network.Your network has 2

You are a network administrator for Ezonexam.com's Windows 2000 network.

Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.

Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."

What should you do?

A.Use System File Checker (SFC) to decrypt the file.

B.Log on the network as the Recovery Agent. Decrypt the files for the manager.

C.Log on the network as the administrator. Use the cipher command to decrypt the files.

D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.

点击查看答案

第8题

You are the network administrator for Ezonexam.com. Your network has 210 Windows 2000 Prof
essional computers and eleven Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Sandra leaves Ezonexam.com. You decrypt the files for her manager. When the manager attempts to open any of the files, he receives the following error message: "Access is denied."

You want the manager to be able to access the files.

What should do? (Each correct answer presents a complete solution. Choose two.)

A.Move the files from Sandra's folder to the manager's folder.

B.Grant the manager NTFSFull Controlpermission to the files.

C.Run theciphercommand to create a new file encryption key for the manager.

D.Run theciphercommand to generate an EFS recovery agent key and certificate.

E.Grant the manager NTFSList Folder Contentspermissions to the folder containing Sandra's files.

点击查看答案

第9题

You are the network administrator for TestKing.com. All user accounts and groups in the do
main are in the container named Users.Company naming conventions require that names of global groups begin with G_ and names of domain local groups begin with DL_. A domain local group named HRServices does not meet the requirements. The HRServices group has one global group member named G_HRUsers. The HRServices group is assigned to Allow - Full Control permission for a shared folder named HRFiles. The shard folder is located on a file server.You need to rename the HRServices group to meet the naming conventionrequirements. In addition, you need to ensure that user access to the HRFiles shared folder is not disrupted while you perform the procedure.What are two possible ways to achieve this goal? ()(Each correct answer presents a cplete solution. Choose two.)

A. Open Active Directory Users and Computers, and then delete the existing HRServices domain local group. Create a new domain local group named DL_HRServices. Add the G_HRUsers group to the DL_HRServices group. Assign the DL_HRServices group the Allow - Full Control permission for the HRFiles shared folder.

B. Open the Active Directory Users and Computers, and then change the name of the HRservices group to DL_HRServices.

C. Run the following command: dsadd group CN=DL_HRServices,CN=Users,DC=testking.com,DC=com - member CN=G_HRUsers,CN=Users,DC=testking,DC=com

D. Run the following command: dsmove CN=HRServices,CN=Users,DC=testking,DC=com -newname DL_HRServices

点击查看答案

第10题

In Recovery Manager (RMAN), you are taking image copies of the datafiles of your productio

In Recovery Manager (RMAN), you are taking image copies of the datafiles of your production database and rolling them forward as regular intervals. You attempt to restart your database instance after a regular maintenance task, you realize that one of the data files that belongs to the USERS tablespace is damaged and you need to recover the datafile by using the image copy. You could perform the following steps to accomplish this:1) Mount the database2) Take the data file offline3) Bring the data file online4) Use the RMAN SWITCH TO command to switch the image copy5) Apply the archived redo logs6) Open the database7) Use the RMAN RESTORE TO command to switch to the image copyWhich two options illustrate the correct sequence of steps that you could follow?() (Choose two.)

A. 2, 6, 4, 5, 3

B. 1, 2, 4, 5, 3, 6

C. 1, 2, 4, 6, 3

D. 1, 2, 7, 5, 3, 6

点击查看答案

第11题

User programs interact with the kernel through a set of standard(71). They request service

User programs interact with the kernel through a set of standard(71). They request services to be provided by the kernel. Such services would include accessing a file: open close, read, write, link, or execute a file; starting or(72)accounting records; changing ownership of a file or(73); changing to a new directory; creating,(74), or killing a process; enabling access to hardware devices; and setting limits on system resources. Unix is a multi -user, multi -tasking operating system. You can have many users logged into a system simultaneously, each running many programs. It's the kernel's job to keep each process and user separate and to regulate access to(75), including cpu, memory, disk and other L/O devices.

A.system commands

B.system transfer

C.system calls

D.system rings

点击查看答案
赏学吧APP
TOP
重置密码
账号:
旧密码:
新密码:
确认密码:
确认修改
购买搜题卡查看答案
购买前请仔细阅读《购买须知》
请选择支付方式
微信支付
支付宝支付
点击支付即表示你同意并接受《服务协议》《购买须知》
立即支付
搜题卡使用说明

1. 搜题次数扣减规则:

功能 扣减规则
基础费
(查看答案)
加收费
(AI功能)
文字搜题、查看答案 1/每题 0/每次
语音搜题、查看答案 1/每题 2/每次
单题拍照识别、查看答案 1/每题 2/每次
整页拍照识别、查看答案 1/每题 5/每次

备注:网站、APP、小程序均支持文字搜题、查看答案;语音搜题、单题拍照识别、整页拍照识别仅APP、小程序支持。

2. 使用语音搜索、拍照搜索等AI功能需安装APP(或打开微信小程序)。

3. 搜题卡过期将作废,不支持退款,请在有效期内使用完毕。

请使用微信扫码支付(元)
订单号:
遇到问题请联系在线客服
请不要关闭本页面,支付完成后请点击【支付完成】按钮
遇到问题请联系在线客服
恭喜您,购买搜题卡成功 系统为您生成的账号密码如下:
重要提示: 请勿将账号共享给其他人使用,违者账号将被封禁。
发送账号到微信 保存账号查看答案
怕账号密码记不住?建议关注微信公众号绑定微信,开通微信扫码登录功能
警告:系统检测到您的账号存在安全风险

为了保护您的账号安全,请在“赏学吧”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!

- 微信扫码关注赏学吧 -
警告:系统检测到您的账号存在安全风险
抱歉,您的账号因涉嫌违反赏学吧购买须知被冻结。您可在“赏学吧”微信公众号中的“官网服务”-“账号解封申请”申请解封,或联系客服
- 微信扫码关注赏学吧 -
请用微信扫码测试
温馨提示
每个试题只能免费做一次,如需多次做题,请购买搜题卡
立即购买
稍后再说
赏学吧