单选题The system analysts have requested heavy use of object features. The database design makes use of PL/SQL8 object types, methods, and LOB types. How do you work with these features on the client?()AWrite client-side subprograms containing the PL/SQL8 constructs, and move them into an object group. BWrite server-side subprograms, and call the subprograms from the form application. CStore the PL/SQL8 constructs in a PL/SQL library, and attack the library to each form muddle in your application.
单选题
The system analysts have requested heavy use of object features. The database design makes use of PL/SQL8 object types, methods, and LOB types. How do you work with these features on the client?()
A
Write client-side subprograms containing the PL/SQL8 constructs, and move them into an object group.
B
Write server-side subprograms, and call the subprograms from the form application.
C
Store the PL/SQL8 constructs in a PL/SQL library, and attack the library to each form muddle in your application.
参考解析
解析:
暂无解析
相关考题:
●Models drawn by the system analysts during the process of the structured analysis are(72).(72) A.PERTsB.EMVC.UMLsD. DFDs
You executed this command to create a password file:$ orapwd file = orapworcl entries = 10 ignorecase = NWhich two statements are true about the password file?() A. It will permit the use of uppercase passwords for database users who have been granted the SYSOPER role.B. It contains username and passwords of database users who are members of the OSOPER operating system group.C. It contains usernames and passwords of database users who are members of the OSDBA operating system group.D. It will permit the use of lowercase passwords for database users who have granted the SYSDBA role.E. It will not permit the use of mixed case passwords for the database users who have been granted the SYSDBA role.
Models drawn by the system analysts during the process of the structured analysis are(72).A.PERTsB.EMVC.UMLsD.DFDs
The task at hand now is to(56)the programmers who still use yesterday's software technology to solve today's software problems. Object-oriented programming requires a new attitude toward problem(57). Problem(57)with computer system becomes more natural. Application can(58)be translated into(59). Although it is commonly believed that it will be easier to train new programmers to use object-oriented techniques than to(60)programmers who have substantial experience in applying conventional programming language constructs.A.testB.forceC.educateD.touch
The Charterers to have the right to __________ of all winches,derricks including heavy lift gear and/or cranes to their full capacity.A.Freely useB.Use freelyC.Free useD.Use free
( )analysis emphasizes the drawing of pictorial system models to document and validate both existing and/or proposed systems.Ultimately,the system models become the( )for designing and constructing an improved system.( )is such a technique.The emphasis in this technique is process-centered.Systems analysts draw a series of process models called( )、(请作答此空)is another such technique that integrates data and process concerns into constructs called objects.A.Structured analysisB.Information EngineeringC.Discovery PrototypingD.Object-Oriented analysis
An administrator does not have console access to a Windows Server. Which of the following command line utilities should the administrator use to reboot the system remotely?()A、rebootB、pkillC、shutdownD、kill
Proper lifting technique for heavy items is:()A、to use gloves to pick up the item.B、to squat and lift from the legs.C、to have two people bend down and pick the item up.D、to bend down and lift the item up.
A system does not have a nameserver defined for IP address resolution. What file does AIX use to determine the IP address of a remote system?()A、/etc/hostsB、/etc/namesC、/etc/rc.tcpipD、/etc/resolv.conf
You are designing an n-tier Java EE application. You have already decided that some of your JSPs willneed to get data from a Customer entity bean. You are trying to decide whether to use a Customer stubobject or a Transfer Object. Which two statements are true?()A、The stub will increase network traffic.B、The Transfer Object will decrease data staleness.C、The stub will increase the logic necessary in the JSPs.D、In both cases, the JSPs can use EL expressions to get data.E、Only the Transfer Object will need to use a Business Delegate.
You have a large amount of historical data in a flat file. Some analysts in your organization need toquery this data in the file. The file is too large to load the data in it into your current database. Which is the most effective method to access this data in your database()A、Use the database link.B、Use the SQL*Loader utility.C、Use the Oracle Data Pump utility.D、Create an external table and leave the data in the flat file
Your system performs heavy transaction processing between 8:00 A.M. and 5:00 P.M. but runs batch processing and reports after that. You decide to create a separate resource plan to govern resource allocation for each time period. Which scheduler object will you use to switch automatically between the two resource plans?() A、 WindowB、 ProgramC、 Job_ClassD、 Window group
The system analysts have requested heavy use of object features. The database design makes use of PL/SQL8 object types, methods, and LOB types. How do you work with these features on the client?()A、Write client-side subprograms containing the PL/SQL8 constructs, and move them into an object group. B、Write server-side subprograms, and call the subprograms from the form application. C、Store the PL/SQL8 constructs in a PL/SQL library, and attack the library to each form muddle in your application.
You have a large amount of historical data in an operating system file. Some analysts in your organization need to query this data. The file is too large to load into your current database. Which is the most effective method to accomplish the task?()A、Upgrade the hardware/memory to accommodate the data.B、Load the data into your database by using the PARALLEL clause.C、Give analysts DBA privilege, so that they can query DBA_EXTERNAL_TABLES.D、Use an external table so you can have the metadata available in your database, but leave the data in the operating system files.
ou have a large amount of historical data in a flat file. Some analysts in your organization need to query thisdata in the file. The file is too large to load the data in it into your current database. Which is the most effectivemethod to access this data in your database()A、Use the database link.B、Use the SQL*Loader utility.C、Use the Oracle Data Pump utility.D、Create an external table and leave the data in the flat file
You are auditing some events on your Windows 2000 Professional computer. You make changes in the system time of this computer. Under what event will this log be generated in the event viewer? ()A、Privilege UseB、Object UseC、Security Settings UseD、System Use
You are the administrator of ExamSheet.net's network. Your Windows 2000 Professional computer has a Pentium II 400-MHz processor, 64 MB of RAM, and an IDE hard disk. After installing a new video editing application you notice that yo ur computer is responding very slowly and you are experiencing long delays in processing video files. You want to evaluate the performance of the hard disk to determine if it is a bottleneck. What should you do?()A、Use Task Manager to view the running applications.B、Use Task Manager to view the running process.C、Use System Monitor to view the physical disk object counters.D、Use System Monitor to view the logical disk object counters.
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Today you notice that applications that run on the server have poor performances. You doubt that this has something to do with table scans. You have to capture the appropriate information by using an appropriate Windows System Monitor object. In the options below, which performance object should you use? () A、You should use SQLServer:Buffer ManagerB、You should use SQLServer:Memory Manager C、You should use SQLServer:Databases D、You should use SQLServer:Access Methods
单选题The system analysts have requested heavy use of object features. The database design makes use of PL/SQL8 object types, methods, and LOB types. How do you work with these features on the client?()AWrite client-side subprograms containing the PL/SQL8 constructs, and move them into an object group. BWrite server-side subprograms, and call the subprograms from the form application. CStore the PL/SQL8 constructs in a PL/SQL library, and attack the library to each form muddle in your application.
单选题You are working on an existing Web site. You need to secure the Web site by redirecting all users to the logon page, Login.aspx. After logging on, users must be sent back to the page that they originally requested. Which code segment should you use? ()AIn the Web.config file: authorization deny users=? //authorization On each page in the Web site: Protected Sub Page_Load(ByVal sender As Object, _ ByVal e As System.EventArgs) Handles Me.Load FormsAuthentication.Initialize() End SubBOn each page in the Web site: Protected Sub Page_Load(ByVal sender As Object, _ ByVal e As System.EventArgs) Handles Me.Load FormsAuthentication RedirectToLoginPage(login.aspx) End SubCOn each page in the Web site: Protected Sub Page_Load(ByVal sender As Object, _ ByVal e As System.EventArgs) Handles Me.Load Response.Redirect(login.aspx) End SubDIn the Web.config file: authentication mode=Forms forms name=.ASPXUSERDEMO loginUrl=login.aspx protection=All timeout=60 //authentication
单选题The main advantage of a Chinese stopper over the one line stopper is that it().Awill not jam on the mooring lineBis strongerCis easier to use when under heavy tensionDis safer to use when under heavy tension
单选题You have to store user data of 200 KB in an object. Which state management technique to use:()AServer sessionBCookieCViewStateDHidden Field
单选题You are the Exchange administrator of the Xxx Corporation’s Exchange 2010 organization.You are concerned about the total size of items that are stored in a public folder namedExpenseReport.Click the Exhibit (s) button to view the public folder configuration. Which of the following techniques should you use to determine the size of items and the attachments in the public folder?()A Run the following script: Get-PublicFolderItemStatistics -Identity "/ExpenseReport/2009"B Click on the Statistics tab in the properties of the public folder with the Public Folder Management ConsoleC Use the MSExchangeIS Public object in System MonitorD Use the MSExchangeIS object in System Monitor
单选题Your system performs heavy transaction processing between 8:00 A.M. and 5:00 P.M. but runs batch processing and reports after that. You decide to create a separate resource plan to govern resource allocation for each time period. Which scheduler object will you use to switch automatically between the two resource plans?()A WindowB ProgramC Job_ClassD Window group
多选题You are designing an n-tier Java EE application. You have already decided that some of your JSPs willneed to get data from a Customer entity bean. You are trying to decide whether to use a Customer stubobject or a Transfer Object. Which two statements are true?()AThe stub will increase network traffic.BThe Transfer Object will decrease data staleness.CThe stub will increase the logic necessary in the JSPs.DIn both cases, the JSPs can use EL expressions to get data.EOnly the Transfer Object will need to use a Business Delegate.
单选题You have a large amount of historical data in an operating system file. Some analysts in your organization need to query this data. The file is too large to load into your current database. Which is the most effective method to accomplish the task?()AUpgrade the hardware/memory to accommodate the data.BLoad the data into your database by using the PARALLEL clause.CGive analysts DBA privilege, so that they can query DBA_EXTERNAL_TABLES.DUse an external table so you can have the metadata available in your database, but leave the data in the operating system files.
单选题You work as an application developer at Certkiller .com. You are developing an application that makes use of a Queue class object named MyQueue. This Queue class object will be used to store messages sent by the user during application run time.You would like to access the message at the beginning of the queue, prior to processing the user messages, without removing it. What should you do?()A Use the Enqueue method of the MyQueue object.B Use the Contains method of the MyQueue object.C Use the Dequeue method of the MyQueue object.D Use the Peek method of the MyQueue object.
单选题You are the network administrator for your company. The network contains an application server running Windows Server 2003. Users report that the application server intermittently responds slowly. When the application server is responding slowly, requests that normally take 1 second to complete take more than 30 seconds to complete. You suspect that the slow server response is because of high broadcast traffic on the network. You need to plan how to monitor the application server and to have a message generated when broadcast traffic is high. You also want to minimize the creation of false alarms when nonbroadcast traffic is high. What should you do? ()A Use the Alerts option in the Performance Logs and Alerts snap-in to configure an alert to trigger when the Datagrams/sec counter in the UDPv4 object is high.B Use System Monitor and configure it to monitor the Segments/sec counter in the TCPv4 object. C Use System Monitor and configure it to monitor the Datagrams/sec counter in the UDPv4 object.D Use the Alerts option in the Performance Logs and Alerts snap-in to configure an alert to trigger when the Datagrams/sec counter in the TCPv4 object is high.