CMS专题

单选题You want to access employee details contained in flat files as part of the EMPLOYEE table. You plan to add anew column to the EMPLOYEE table to achieve this.  Which data type would you use for the new column()A CLOBB BLOBC BFILED LONG RAW

题目
单选题
You want to access employee details contained in flat files as part of the EMPLOYEE table. You plan to add anew column to the EMPLOYEE table to achieve this.  Which data type would you use for the new column()
A

CLOB

B

BLOB

C

BFILE

D

LONG RAW

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

What are two indicators that a customer should consider the installation of a Wireless LAN Controller? ()

  • A、need one access point
  • B、want to provide unsecured wireless access
  • C、need between two and three access points
  • D、want to provide employee wireless access
  • E、need more than four access points
  • F、want to provide guest wireless access

正确答案:E,F

第2题:

In which scenario would TOP N analysis be the best solution?()

  • A、You want to identify the most senior employee in the company.
  • B、You want to find the manager supervising the largest number of employees.
  • C、You want to identify the person who makes the highest salary for all employees.
  • D、You want to rank the top three sales representatives who have sold the maximum number of products.

正确答案:D

第3题:

You are the administrator of several SQL Server 2000 computers. A data Transformation Services (DTS) package uses native OLE DB providers to transfer data between the servers. Connection details for the servers are specified in .udl files. The .udl files are frequently updated as connection details change.

You want to distribute the DTS package as a file to developers in your company. You want to make sure connection details are available to developers who receive the DTS package.

Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two)

A.Enable the Always read properties from UDL file option in the Connection Properties dialog box.

B.Disable the Always read properties from UDL file option in the Connection Properties dialog box.

C.Delete the .udl files and store connection details in the registry by using system data source names.

D.Delete the .udl files, and store connection details in the registry by using user data source names.

E.Make the .udl files available on a network share.


正确答案:AE
解析:Explanation:
A: To make the connection information available for the developers we must enable the Always read properties from UDL file option.

E: We provide the developers with access to the .udl file by placing the .udl files in a network share and setting appropriate share and NTFS permissions.

Note: In SQL Server 2000, DTS packages can use Microsoft Data Link (.udl) files to create OLE DB connections and resolve the connections in run time. With this feature we can encapsulate the connection properties from a DTS package into a separate file and can edit the connection string in a .udl file instead of the connection properties in a DTS package in situations where connection information such as the server name, login, or even the OLE DB provider may change.

When specifying a data link connection, we must first specify whether to load an existing .udl file or create a data link to save with DTS Designer. If we want to use a .udl file rather than saving the data link with DTS Designer, we can create one either from Windows Explorer or during the data link configuration process in DTS Designer. We must then click Microsoft Data Link in the Data Source list of the Connection Properties dialog box and check the Always read properties from UDL file check box. In this scenario, the .udl file is already specified.

Incorrect Answers:
B: If we clear the Always read properties from UDL file option in the Connection Properties dialog box, we would have to edit the connection properties through the Data Transformation Services (DTS) package. This would increase administrative effort.

C: We cannot delete the .udl files and instead store the connection details in the registry by using system data source names as the connection details change regularly.

D: We cannot delete the .udl files, and instead store connection details in the registry by using user data source names as the connection details change regularly.

第4题:

You use a Windows 2000 Professional computer.You are responsible for maintaining Company’s client contact list. You want other users on the networkto be able to read the client contact list. You use Windows Explorer to share the client contact list folderon the network.You want users touse the most current available information when contacting clients. You want toprevent users from enabling offline access for the network share that contains the client contact list.What should you do?()

  • A、Use Synchronization Manager to configure synchronization not to occur when users are connected to the LAN connection.
  • B、Use Windows Explorer to grant users Special access for the reports on the network share.
  • C、Use Windows Explorer to disable caching for the reports on the network share.
  • D、Use Windows Explorer to disable Offline files.

正确答案:C

第5题:

You acquire a pc with 3 hard drives: Disk 0, Disk 1, Disk 2. Each physical disk has a capacity of 6GB. You want each disk to consist of one partition. You want to configure the computer to dual-boot Win98 and Win2K PRO. You want to save your documents to Disk 1 and have the ability to access them under either OS. You also want to install Win2K PRO and have the ability to secure individual files on Disk 2.


正确答案: Drag the appropriate file systems to the correct disks.
Drag FAT32 to Disk0
Drag FAT32 to Disk1
Drag NTFS to Disk2 

第6题:

You are using flat files as the data source for one of your data warehousing applications. To optimize the application performance, you plan to move the data from the flat files to clustered tables in an Oracle database.While migrating the data, you want to have minimal impact on the database performance and optimize the dataload operation.  Which method would you use to load data into the Oracle database()

  • A、Use the external table population.
  • B、Use the Oracle Data Pump export and import utility.
  • C、Use the conventional path data load of the SQL*Loader utility.
  • D、Use the INSERT INTO...SELECT command to load the data

正确答案:C

第7题:

You are the administrator of your company’s network. An employee named Mark is leaving the company. A new employee named Eric has been hired to replace him. Mark has a local user account on a Windows 2000 Professional computer. Mark has rights to multiple files and folders on the computer.  You want Eric to have the same rights and permissions that Mark has. You want to ensure that Mark will no longer have access to the files and folders. You want to accomplish this with least administrative effort. What should you do?()

  • A、Rename Mark’s user account to Eric and change the account password.
  • B、Create Eric’s account by copying Mark’s profile to Eric’s account. Delete Mark’s account.
  • C、Create Eric’s account by copying Marks account. Delete Mark’s account.
  • D、Delete Mark’s account. Add Eric’s account. Add Eric to the same groups to which Mark belonged. Grant Eric to all the individual user rights and permissions that Mark had.

正确答案:A

第8题:

You are the administrator of your company's network. An employee named Mark is leaving the company. A new employee named Eric has been hired to replace him.

Mark has a local user account on a Windows 2000 Professional computer. Mark has rights to multiple files and folders on the computer.

You want Eric to have the same rights and permissions that Mark has. You want to ensure that Mark will no longer have access to the files and folders. You want to accomplish this with least administrative effort.

What should you do?

A.Rename Mark's user account to Eric and change the account password.

B.Create Eric's account by copying Mark's profile to Eric's account. Delete Mark's account.

C.Create Eric's account by copying Marks account. Delete Mark's account.

D.Delete Mark's account. Add Eric's account. Add Eric to the same groups to which Mark belonged. Grant Eric to all the individual user rights and permissions that Mark had.


正确答案:A
解析:Explanation: A user account and the permission and rights attached to them can easily be transferred to another user by renaming the account and changing the password. By renaming Mark's user account and by changing the password, Eric will have the same rights and permissions as Mark had, and Mark will not be able to use his old account. This provides the solution with least amount of administrative effort.

Incorrect Answers:
B: Copying Mark's profile to Eric's account will not give Eric the permissions Mark had. Instead Eric will have the same desktop settings.

C:Every user account has a unique Security Identifier (SID). When Mark's account is copied the resulting account, Eric's account, will not have the same permissions.

D: This solution will meet the requirements of this scenario; however, it is not the solution with least administrative effort. Therefore this is not the best solution. The best solution would be to rename Marks account and change the password. This would provide Eric with the same rights and permission that Mark had and would not require us to do any additional administrative work on Eric's account.

第9题:

You recently upgraded all Windows NT Workstation 4.0 computers to Windows 2000 Professional. You want to give a new employee named Maria the ability to back up files, share resources, and install programs on a client computer that she shares with other users. You do not want Maria to be able to read other users’ files.   What should you do to accomplish these goals?()

  • A、Add Maria’s user account to the system group.
  • B、Add Maria’s user account to the interactive group.
  • C、Add Maria’s user account to the power user group.
  • D、Add Maria’s user account to the administrators group.
  • E、Add Maria’s user account to the Backup Operators group.

正确答案:C,E

第10题:

You have 30 NT 4.0 machines and 5 W2k Pro machines on your network. You want to share files on the W2kPro machines that only they can access. The NT 4 machines must not be able to access those shared files at all? ()

  • A、You should import hisecws.inf security template.
  • B、You should import hisecdc.inf security template.
  • C、You should import securews.inf security template.
  • D、You should import compatws.inf security template.

正确答案:A

更多相关问题