3. Refer to the exhibit. Whichtwo statements are true about interVLAN routing in the topology that is shownin the exhibit?

(Choose two.)

A.  Host E and host F use the sameIP gateway address.

B.  Router1 and Switch2 should beconnected via a crossover cable.

C.  Router1 will not play a role incommunications between host A and host D.

D.  The FastEthernet 0/0 interfaceon Router1 must be configured with subinterfaces.

E.  Router1 needs more LANinterfaces to accommodate the VLANs that are shown in the exhibit.

F.  The FastEthernet 0/0 interfaceon Router1 and Switch2 trunk ports must be configured using the sameencapsulation type.

Answer:DF

4. Refer to the exhibit. Whichtwo statements are true about the loopback address that is configured onRouterB? (Choose two.)

A.  It ensures that data will beforwarded by RouterB.

B.  It provides stability for theOSPF process on RouterB.

C.  It specifies that the router IDfor RouterB should be 10.0.0.1.

D.  It decreases the metric forroutes that are advertised from RouterB.

E.  It indicates that RouterBshould be elected the DR for the LAN.

Answer:BC

5. A network administrator isexplaining VTP configuration to a new technician. What should the networkadministrator tell the new technician about VTP configuration? (Choose three.)

A.  A switch in the VTP client modecannot update its local VLAN database.

B.  A trunk link must be configuredbetween the switches to forward VTP updates.

C.  A switch in the VTP server modecan update a switch in the VTP transparent mode.

D.  A switch in the VTP transparentmode will forward updates that it receives to other switches.

E.  A switch in the VTP server modeonly updates switches in the VTP client mode that have a higher VTP revisionnumber.

F.  A switch in the VTP server modewill update switches in the VTP client mode regardless of the configured VTPdomain membership.

Answer:ABD

8. Refer to the exhibit. Bothswitches are using a default configuration. Which two destination addresseswill host 4 use to send data to host 1?

(Choose two.)

A.  the IP address of host 1

B.  the IP address of host 4

C.  the MAC address of host 1

D.  the MAC address of host 4

E.  the MAC address of the Fa0/0interface of the R1 router

F.  the MAC address of the Fa0/1interface of the R1 router

Answer:AF

9. Refer to the exhibit. Therouter has been configured with these commands:

hostname Gateway interfaceFastEthernet 0/0

ip address 198.133.219.14255.255.255.248 no shutdown interface FastEthernet 0/1

ip address 192.168.10.254255.255.255.0 no shutdown

interface Serial 0/0

ip address 64.100.0.2255.255.255.252 no shutdown

ip route 0.0.0.0 0.0.0.064.100.0.1

What are the two results ofthis configuration?

(Choose two.)

A.  The default route should have anext hop address of 64.100.0.3.

B.  Hosts on the LAN that isconnected to FastEthernet 0/1 are using public IP addressing.

C.  The address of the subnetsegment with the WWW server will support seven more servers.

D.  The addressing scheme allowsusers on the Internet to access the WWW server.

E.  Hosts on the LAN that isconnected to FastEthernet 0/1 will not be able to access the Internet withoutaddress translation.

Answer:DE

11. What are two benefits ofusing VTP in a switching environment? (Choose two.)

A.  It allows switches to readframe tags.

B.  It allows ports to be assignedto VLANs automatically.

C.  It maintains VLAN consistencyacross a switched network.

D.  It allows frames from multipleVLANs to use a single interface.

E.  It allows VLAN information tobe automatically propagated throughout the switching environment.

Answer:CE

12. Which two statements aretrue about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4?

(Choosetwo.)

A.  It establishes a static routeto the 172.16.3.0 network.

B.  It establishes a static routeto the 192.168.2.0 network.

C.  It configures the router tosend any traffic for an unknown destination to the 172.16.3.0 network.

D.  It configures the router tosend any traffic for an unknown destination out the interface with the address192.168.2.4.

E.  It uses the defaultadministrative distance.

F.  It is a route that would beused last if other routes to the same destination exist.

Answer:AE

13. What are two advantages ofLayer 2 Ethernet switches over hubs?

(Choose two.)

A.  decreasing the number ofcollision domains

B.  filtering frames based on MACaddresses

C.  allowing simultaneous frametransmissions

D.  increasing the size ofbroadcast domains

E.  increasing the maximum lengthof UTP cabling between devices

Answer:BC

14. Refer to the exhibit. Anetwork associate needs to configure the switches and router in the graphic sothat the hosts in VLAN3 and VLAN4 can communicate with the enterprise server inVLAN2. Which two Ethernet segments would need to be configured as trunk
links?(Choose two.)

A.  A

B.  B

C.  C

D.  D

E.  E

F.  F

Answer:CF

15. Which two values are usedby Spanning Tree Protocol to elect a root bridge? (Choose two.)

A.  amount of RAM

B.  bridge priority

C.  IOS version

D.  IP address

E.  MAC address

F.  speed of the links

Answer:BE

16. Refer to the exhibit.Assume that the routing protocol referenced in each choice below is configuredwith its default settings and the given routing protocol is running on all therouters. Which two conditional statements accurately state the path that
willbe chosen between networks 10.1.0.0 and 10.3.2.0 for the routing protocolmentioned? (Choose two.)

A.  If OSPF is the routingprotocol, the path will be from R1 to R3 to R4 to R5.

B.  If OSPF is the routingprotocol, the path will be from R1 to R2 to R5.

C.  If OSPF is the routingprotocol, the path will be from R1 to R5.

D.  If RIPv2 is the routingprotocol, the path will be from R1 to R3 to R4 to R5.

E.  If RIPv2 is the routingprotocol, the path will be from R1 to R5.

Answer:AE

17. Refer to the exhibit. Anetwork administrator is adding two new hosts to SwitchA. Which three valuescould be used for the configuration of these hosts? (Choose three.)

A.  host A IP address: 192.168.1.79

B.  host A IP address: 192.168.1.64

C.  host A default gateway:192.168.1.78

D.  host B IP address:192.168.1.128

E.  host B default gateway:192.168.1.129

F.  host B IP address:192.168.1.190

Answer:ACF

35. Refer to the exhibit. Whichstatement is true?

A.  The Fa0/11 role confirms thatSwitchA is the root bridge for VLAN 20.

B.  VLAN 20 is running the Per VLANSpanning Tree Protocol.

C.  The MAC address of the rootbridge is 0017.596d.1580.

D.  SwitchA is not the root bridge,because not all of the interface roles are designated.

通过图我们能够立即推断出SWA不是vlan20的根桥。由于F0/12是堵塞port。而且桥ID大于Root
ID.

Answer:D

44. For which type ofconnection should a straight-through cable be used?

A.  switch to switch

B.  switch to hub

C.  switch to router

D.  hub to hub

E.  router to PC

Answer:C

45. Which set of commands isrecommended to prevent the use of a hub in the access layer?

A.  switch(config-if)#switchportmode trunk switch(config-if)#switchport port-security maximum 1

B.  switch(config-if)#switchportmode trunk

C.  switch(config-if)#switchportport-security mac-address 1

D.  switch(config-if)#switchportmode access switch(config-if)#switchport port-security maximum 1

E.  switch(config-if)#switchportmode access switch(config-if)#switchport port-security mac-address 1

Answer:C

48. Which type of cable is usedto connect the COM port of a host to the COM port of a router or switch?

A.  crossover

B.  straight-through

C.  rolled

D.  shielded twisted-pair

Answer:C

52. Which layer of the OSIreference model uses the hardware address of a device to ensure messagedelivery to the proper host on a LAN?

A.  physical

B.  data link

C.  network

D.  transport

Answer:B

53. Which layer of the OSIreference model uses flow control, sequencing, and acknowledgements to ensurethat reliable networking occurs?

A.  data link

B.  network

C.  transport

D.  presentation E. physical

Answer:C

55. Which IP address can beassigned to an Internet interface?

A.  10.180.48.224

B.  9.255.255.10

C.  192.168.20.223

D.  172.16.200.18

Answer:B

63. Which line from the outputof the show ip interface command indicates a layer 1 problem?

A.  Serial0/1 is up, line protocolis down

B.  Serial0/1 is down, lineprotocol is down

C.  Serial0/1 is up, line protocolis up

D.  Serial0/1 is administrativelydown, line protocol is down

Answer:B

67. What is the name of the VTPmode of operation that enables a switch to forward only VTP advertisementswhile still permitting the editing of local VLAN information?

A.  server

B.  client

C.  tunnel

D.  transparent

Answer:D

70. Refer to the exhibit. WhichVLSM mask will allow for the appropriate number of host addresses for NetworkA?

A.  /25

B.  /26

C.  /27

D.  /28

Answer:A

71. Refer to the exhibit. Whichsubnet mask will place all hosts on Network B in the same subnet with the leastamount of wasted addresses?

A.  255.255.255.0

B.  255.255.254.0

C.  255.255.252.0

D.  255.255.248.0

Answer:B

72. Refer to the exhibit. Whichmask is correct to use for the WAN link between the routers that will provideconnectivity while wasting the least amount of addresses?

A.  /23

B.  /24

C.  /25

D.  /30

Answer:D

73. Refer to the exhibit. Whatis the most appropriate summarization for these routes?

A. 10.0.0.0 /21

B.  10.0.0.0 /22

C.  10.0.0.0 /23

D.  10.0.0.0 /24

Answer:B

77. Which two link protocolsare used to carry multiple VLANs over a single link? (Choose two.)

A.  VTP

B.  802.1q

C.  IGP

D.  ISL

E.  802.3u

Answer:BD

78. Which two protocols areused by bridges and/or switches to prevent loops in a layer 2 network?

(Choose two.)

A.  802.1d

B.  VTP

C.  802.1q

D.  STP E. SAP

Answer:AD

79. On the network131.1.123.0/27, what is the last IP address that can be assigned to a host?

A.  131.1.123.30

B. 131.1.123.31

C. 131.1.123.32

D. 131.1.123.33

Answer:A

80. The ip subnet zero commandis not configured on a router. What would be the IP address of Ethernet 0/0using the first available address from the sixth subnet of the network192.168.8.0/29?

A.  192.168.8.25

B.  192.168.8.41

C.  192.168.8.49

D.  192.168.8.113

Answer:C

81. For the network192.0.2.0/23, which option is a valid IP address that can be assigned to ahost?

A. 192.0.2.0

B. 192.0.2.255

C. 192.0.3.255

D.  192.0.4.0

Answer:B

85. Which switch would STPchoose to become the root bridge in the selection process?

A.  32768: 11-22-33-44-55-66

B.  32768: 22-33-44-55-66-77

C.  32769: 11-22-33-44-55-65

D.  32769: 22-33-44-55-66-78

Answer:A

86. A switch is configured withall ports assigned to vlan 2 with full duplex FastEthernet to segment existingdepartmental traffic. What is the effect of adding switch ports to a new VLANon the switch?

A.  More collision domains will becreated.

B.  IP address utilization will bemore efficient.

C.  More bandwidth will be requiredthan was needed previously.

D.  An additional broadcast domainwill be created.

Answer:D

87. Which two statements aboutthe use of VLANs to segment a network are true?

(Choose two.)

A.  VLANs increase the size ofcollision domains.

B.  VLANs allow logical grouping ofusers by function.

C.  VLANs simplify switchadministration.

D.  VLANs enhance network security.

这个题目考查的还是VLAN的作用

不外乎三个逻辑上隔开port

添加安全性与隔离广播域

从中选就能够了。

Answer:BD

88. On corporate network, hostson the same VLAN can communicate with each other, but they are unable tocommunicate with hosts on different VLANs. What is needed to allowcommunication between the VLANs?

A.  a router with subinterfacesconfigured on the physical interface that is connected to the switch

B.  a router with an IP address onthe physical interface connected to the switch

C.  a switch with an access linkthat is configured between the switches

D.  a switch with a trunk link thatis configured between the switches

Answer:A

94. An administrator attempts atraceroute but receives a "Destination Unreadable" message. Whichprotocol is responsible for that message?

A.  RARP

B.  RUDP

C.  ICMP

D.  SNMP

Answer:C

100. Which two addresses can beassigned to a host with a subnet mask of 255.255.254.0? (Choose two.)

A.  113.10.4.0

B.  186.54.3.0

C.  175.33.3.255

D.  26.35.2.255 E. 17.35.36.0

Answer:BD

101. The network administratorhas asked you to check the status of the workstation's IP stack by pinging theloopback address. Which address would you ping to perform this task?

A.  10.1.1.1

B.  127.0.0.1

C.  192.168.0.1

D.  239.1.1.1

Answer:B

107. Which command is used toconfigure a default route?

A.  ip route 172.16.1.0255.255.255.0 0.0.0.0

B.  ip route 172.16.1.0255.255.255.0 172.16.2.1

C.  ip route 0.0.0.0 255.255.255.0172.16.2.1

D.  ip route 0.0.0.0 0.0.0.0172.16.2.1

Answer:D

147. Refer to the exhibit.Which value will be configured for Default Gateway of the Local AreaConnection?

A.  10.0.0.0

B.  10.0.0.254

C.  192.223.129.0

D.  192.223.129.254

Answer:B

151. Refer to the exhibit. Whatwill happen to HTTP traffic coming from the Internet that is destined for172.16.12.10 if the traffic is processed by this ACL?

A.  Traffic will be dropped perline 30 of the ACL.

B.  Traffic will be accepted perline 40 of the ACL.

C.  Traffic will be dropped,because of the implicit deny all at the end of the ACL.

D.  Traffic will be accepted,because the source address is not covered by the ACL.

Answer:C

190. Refer to the diagram. Allhosts have connectivity with one another. Which statements describe theaddressing scheme that is in use in the network?

(Choose three.)

A.  The subnet mask in use is255.255.255.192.

B.  The subnet mask in use is255.255.255.128.

C.  The IP address 172.16.1.25 canbe assigned to hosts in VLAN1

D.  The IP address 172.16.1.205 canbe assigned to hosts in VLAN1

E.  The LAN interface of the routeris configured with one IP address.

F.  The LAN interface of the routeris configured with multiple IP addresses.

Answer:BCF

191. Refer to the diagram.Which three statements describe the router port configuration and the switchport configuration as shown in the topology? (Choose three.)

A.  The Router1 WAN port is configured as atrunking port.

B.  The Router1 port connected to Switch1 isconfigured using subinterfaces.

C.  The Router1 port connected to Switch1 isconfigured as 10 Mbps.

D.  The Switch1 port connected to Router1 isconfigured as a trunking port.

E.  The Switch1 port connected to Host B isconfigured as an access port.

F.  The Switch1 port connected to Hub1 isconfigured as full duplex.

Answer: BDE

192. Which routing protocolswill support the following IP addressing scheme?

(Choose three.)

Network 1 -192.168.10.0 /26

Network 2 -192.168.10.64 /27

Network 3 -192.168.10.96 /27

Network 4 -192.168.10.128 /30

Network 5 -192.168.10.132 /30

A.  RIP version 1

B.  RIP version 2

C.  IGRP

D.  EIGRP

E.  OSPF

Answer:BDE

198. Anetwork associate is trying to understand the operation of the FLD Corporationby studying the network in the exhibit. The associate knows that the server inVLAN 4 provides the necessary resources to support the user hosts in the otherVLANs. The associate
needs to determine which interfaces are access ports.Which interfaces are access ports? (Choose three.)

A.  Switch1 -Fa 0/2

B.  Switch1 -Fa 0/9

C.  Switch2 -Fa 0/3

D.  Switch2 -Fa 0/4

E.  Switch2 -Fa 0/8

F.  Router -Fa 1/0

Answer:ACD

199. Refer to the exhibit.Which destination addresses will Host A use to send data to Host B? (Choose two.)

A. the IP address of Switch1

B.  the IP address of Router1 Fa0/0

C.  the IP address of HostB

D.  the MAC address of Switch1

E.  the MAC address of Router1 Fa0/0

F.  the MAC address of HostB

Answer:CE

200. The network securitypolicy requires that only one host be permitted to attach dynamically to eachswitch interface. If that policy is violated, the interface should shut down.Which two commands must the network administrator configure on the 2950Catalyst
switch to meet this policy? (Choose two.)

A.  Switch1(config-if)# switchportport-security maximum 1

B.  Switch1(config)#mac-address-table secure

C.  Switch1(config)# access-list 10permit ip host

D.  Switch1(config-if)# switchportport-security violation shutdown

E.  Switch1(config-if)# ipaccess-group 10

Answer:AD

201. Refer to the graphic. Astatic route to the 10.5.6.0/24 network is to be configured on the HFD router.Which commands will accomplish this? (Choose two.)

A.  HFD(config)# ip route 10.5.6.00.0.0.255 fa0/0

B.  HFD(config)# ip route 10.5.6.00.0.0.255 10.5.4.6

C.  HFD(config)# ip route 10.5.6.0255.255.255.0 fa0/0

D.  HFD(config)# ip route 10.5.6.0255.255.255.0 10.5.4.6

E.  HFD(config)# ip route 10.5.4.60.0.0.255 10.5.6.0

F.  HFD(config)# ip route 10.5.4.6255.255.255.0 10.5.6.0

Answer:CD

205. Refer to the graphic. Host1 cannot receive packets from Host 2. Assuming that RIP v1 is the routingprotocol in use, what is wrong with the IP configuration information shown?

(Choose two.)

A.  The fa0/1 interface of routerR2 has been assigned a broadcast address.

B.  The fa0/1 network on router R2overlaps with the LAN attached to R1.

C.  Host 2 has been assigned theincorrect subnet mask.

D.  Host 1 has been configured withthe 255.255.248.0 subnet mask.

E.  Host 2 on router R2 is on adifferent subnet than its gateway.

Answer:BC

206. What are three validreasons to assign ports to VLANs on a switch?

(Choose three.)

A.  to make VTP easier to implement

B.  to isolate broadcast traffic

C.  to increase the size of thecollision domain

D.  to allow more devices toconnect to the network

E.  to logically group hostsaccording to function

F.  to increase network security

Answer:BEF

207.Refer to the topology shown in the exhibit. Which ports will be STP designatedports if all the links are operating at the same bandwidth? (Choose three.)

A.  Switch A -Fa0/0

B.  Switch A -Fa0/1

C.  Switch B -Fa0/0

D.  Switch B -Fa0/1

E.  Switch C -Fa0/0

F.  Switch C -Fa0/1

Answer:BCD

208. Which statements describetwo of the benefits of VLAN Trunking Protocol? (Choose two.)

A.  VTP allows routing betweenVLANs.

B.  VTP allows a single switch portto carry information to more than one VLAN.

C.  VTP allows physically redundantlinks while preventing switching loops.

D.  VTP simplifies switchadministration by allowing switches to automatically share VLAN configurationinformation.

E.  VTP helps to limitconfiguration errors by keeping VLAN naming consistent across the VTP domain.

F.  VTP enhances security bypreventing unauthorized hosts from connecting to the VTP domain.

Answer:DE

209. What are two results ofentering the Switch(config)# vtp mode client command on a Catalyst switch?

(Choose two.)

A.  The switch will ignore VTPsummary advertisements.

B.  The switch will forward VTPsummary advertisements.

C.  The switch will process VTPsummary advertisements.

D.  The switch will originate VTPsummary advertisements.

E.  The switch will create, modifyand delete VLANs for the entire VTP domain.

Answer:BC

210. A network administratorissues the ping 192.168.2.5 command and successfully tests connectivity to ahost that has been newly connected to the network. Which protocols were usedduring the test? (Choose two.)

A.  ARP

B.  CDP

C.  DHCP

D.  DNS

E.  ICMP

Answer:AE

211. Refer to the exhibit. HostA is to send data to Host B. How will Router1 handle the data frame receivedfrom Host A? (Choose three.)

A.  Router1 will strip off thesource MAC address and replace it with the MAC address on the forwardingFastEthernet interface.

B.  Router1 will strip off thesource IP address and replace it with the IP address on the forwardingFastEthernet interface.

C.  Router1 will strip off thedestination MAC address and replace it with the MAC address of Host B.

D.  Router1 will strip off thedestination IP address and replace it with the IP address of Host B.

E.  Router1 will forward the dataframe out interface FastEthernet0/1.

F.  Router1 will forward the dataframe out interface FastEthernet0/2.

Answer:ACF

212. Refer to the exhibit. Whatwill Router1 do when it receives the data frame shown? (Choose three.)

A.  Router1 will strip off thesource MAC address and replace it with the MAC address 0000.0c36.6965.

B.  Router1 will strip off thesource IP address and replace it with the IP address 192.168.40.1.

C.  Router1 will strip off thedestination MAC address and replace it with the MAC address 0000.0c07.4320.

D.  Router1 will strip off thedestination IP address and replace it with the IP address of 192.168.40.1.

E.  Router1 will forward the datapacket out interface FastEthernet0/1.

F.  Router1 will forward the datapacket out interface FastEthernet0/2.

Answer:ACF

315.

Answer:

321.

Answer:

325.

Answer:

338. All hosts in the samesubnet with 172.16.5.118/26 must be denied Telnet access to hosts outside theLAN. To complete the bracketed command, [ access-list list-number deny tcp172.16.5.__ address 0.0.0.__ mask___ any eq port__], drag each appropriateoption
on the left to its proper placeholder on the right. (Not all options areused.)

Answer:

CCNA 例题精选的更多相关文章

  1. dp优化 | 各种dp优化方式例题精选

    前言 本文选题都较为基础,仅用于展示优化方式,如果是要找题单而不是看基础概念,请忽略本文. 本文包含一些常见的dp优化("√"表示下文会进行展示,没"√"表示暂 ...

  2. BIT 树状数组 详解 及 例题

    (一)树状数组的概念 如果给定一个数组,要你求里面所有数的和,一般都会想到累加.但是当那个数组很大的时候,累加就显得太耗时了,时间复杂度为O(n),并且采用累加的方法还有一个局限,那就是,当修改掉数组 ...

  3. STL模板中的map的使用与例题

    最近的计分赛,记得自己的都只是过了两题.遇到了两次map,自己在寒假看了一点的map,只知道在字符串匹配的时候可以用的到.但是自己对map的使用还是不够熟练使用,这回在第一次和第二次的计分赛中都遇到可 ...

  4. 【转】精选30个优秀的CSS技术和实例

    今天,我为大家收集精选了30个使用纯CSS完成的强大实践的优秀CSS技术和实例,您将在这里发现很多与众不同的技术,比如:图片集.阴影效果.可扩展按钮.菜单等-这些实例都是使用纯CSS和HTML实现的. ...

  5. 精选9个值得学习的 HTML5 效果【附源码】

    这里精选了一组很酷的 HTML5 效果.HTML5 是现 Web 开发领域的热点, 拥有很多让人期待已久的新特性,特别是在移动端,Web 开发人员可以借助 HTML5 强大功能轻松制作各种交互性强.效 ...

  6. C语言经典例题100

    C语言经典例题100 来源 http://www.fishc.com 适合初学者 ----------------------------------------------------------- ...

  7. 因为换工作,需要学习CCNA的课程

    听说集齐7个CCIE就可以召唤神龙,不知道是不是真的,从CCNA开始吧! 加油!!!

  8. swift开源项目精选

    Swift 开源项目精选-v1.0 2016-03-07 22:11 542人阅读 评论(0) 收藏 举报  分类: iOS(55)   Swift(4)    目录(?)[+]   转自 http: ...

  9. CCNA第四章第五章Cisco的IOS与SDM及其管理考试要点学习笔记

    1. IOS的用户界面        Cisco互联网操作系统(IOS)是思科路由器和大多数交换机的核心,它是一个可以提供路由,交换,网络互联以及远程通信功能的专有内核. Cisco路由器的IOS软件 ...

随机推荐

  1. 函数fsp_seg_inode_page_get_nth_inode

    #define FSEG_ARR_OFFSET (FSEG_PAGE_DATA + FLST_NODE_SIZE) #define FSEG_PAGE_DATA FIL_PAGE_DATA #defi ...

  2. 提示35. 怎样实现OfTypeOnly<TEntity>()这样的写法

    提示35. 怎样实现OfTypeOnly<TEntity>()这样的写法 如果你编写这样LINQ to Entities查询: 1 var results = from c in ctx. ...

  3. Spring 教程(二)

    一.Spring AOP介绍 开发其实就是在不断的重构,抽象重复代码,然后进行封装.从最原始的模块化编程到面向对象编程,代码的封装越来越整齐清晰,但是依然存在重复的代码,而这些重复代码几乎都是与业务逻 ...

  4. Entity Framework中查看生成的SQL语句

    Entity Framework 4.0 中是这样的,高版本的跟这个有些差异,不太一样,貌似已经到7了 using (Entities entities = new Entities()) { var ...

  5. kettle作业(job)调用转换,设置变量,写日志到数据库中【转】

    首先建立转换:从数据库表到日志 表输入的设置:   日志设置:   新建job:     转换选择刚才建好的输出日志转换.变量设置如下: 此ID就是转换中的${ID},执行job,可以看到控制台输出日 ...

  6. SQL游标

    最近工作中有用到游标,特简单总结一下: 一.简介      游标(Cursor)是处理数据的一种方法,为了查看或者处理结果集中的数据,游标提供了在结果集中一次以行或者多行前进或向后浏览数据的能力.我们 ...

  7. The new Portable Class Library for SQLite z

    Microsoft Open Technologies has recently released a Portable Class Library for SQLite. Thanks to it, ...

  8. Python脚本控制的WebDriver 常用操作 <二十一> 执行JS

    测试用例场景 如果你熟悉js的话,那么使用webdriver执行js就是一件很高效的事情了.在webdriver脚本中直接执行js的好处很多,这里就不一一枚举了. webdriver提供了execut ...

  9. C++空类以及没有成员变量的类的大小

    关于C++中空类的大小为1,我们大家都有所了解,但是除了空类之外的其他一些没有成员变量的类的大小,还是有很多不明之处的. 我们来看如下一个例子: #include<iostream> us ...

  10. python学习之copy模块

    Python中的对象之间赋值时是按引用传递的,如果需要拷贝对象,需要使用标准库中的copy模块. 1. copy.copy 浅拷贝 只拷贝父对象,不会拷贝对象的内部的子对象.2. copy.deepc ...