单选题You are responsible for a data warehouse application that uses records from an external table to update one of the dimension tables periodically. The records in the external table may contain data for new rows in the dimension table, or for updates to its existing rows. Which type of SQL command would you use to transfer the data from the external table to the dimension table as efficiently as possible?()AMERGEBSELECT …CROSS JOINCINSERT ALL …SELECTDCREATE VIEW …CONSTRAINT
单选题
You are responsible for a data warehouse application that uses records from an external table to update one of the dimension tables periodically. The records in the external table may contain data for new rows in the dimension table, or for updates to its existing rows. Which type of SQL command would you use to transfer the data from the external table to the dimension table as efficiently as possible?()
A
MERGE
B
SELECT …CROSS JOIN
C
INSERT ALL …SELECT
D
CREATE VIEW …CONSTRAINT
参考解析
解析:
暂无解析
相关考题:
Exhibit: You are developing a Web application. The Web application uses a GridView control to display data. You build your Web Forms for the Web application by dragging and dropping tables from the Data Connections tree in Server Explorer. You need to add a connection to your data by using the Add Connection dialog box as shown in the exhibit. During the process, you need to configure the .NET Data Provider that you use to create the data source objects. What should you do?()A. Right-click the connection, and click Properties. Modify the Provider property of the data connection.B. Click the Change button, and change the data provider for the selected data source.C. Click the Advanced button, and change the Data Source property to the target provider.D. Click the Advanced button, and change the Application Name property to the target provider.
Which tier in Oracle E-Business Suite is responsible for storing application data?() A.database tierB.application tierC.client (desktop) tierD.both database tier and application tier
● Business intelligence (BI) is the integrated application of data warehouse, data mining and (73).(73)A.OLAPB.OLTPC.MRPIID.CMS.
Business intelligence (BI) is the integrated application of data warehouse, data mining and (73).A.OLAPB.OLTPC.MRPIID.CMS
Which layer in the OSI model is responsible for translating frames into bits?() A. Application LayerB. Presentation LayerC. Data Link LayerD. Physical Layer
Business intelligence (BI) is the integrated application of data warehouse data mining and ______A.OLAPB.OLTPC.MRPIID.CMS
You install a custom application on a computer that runs Microsoft Windows XP. The application stores each user’s data in the %programfiles%\app1\data folder on the computer. You install the custom application on a computer that runs Windows Vista.On the Windows Vista computer, you back up the %programfiles%\app1\data folder and notice that the backup contains no data.You need to back up the application’s user data on the Windows Vista computer.What should you do?()A.AB.BC.CD.D
A data warehouse is a subject-oriented data set used for reporting and analusis. Data warehouses can be subdivided into ( ). Which store subsets of data from a warehouse.A.OLTPsB.transactionsC.data sartsD.OLAPs
You work as an application developer at Certkiller .com. You are currently in the process of creating a new application for Certkiller .com. You are required to read compressed data files that has been sent by Certkiller .com‘s sales offices.These data files are less than 4 GB in size, but was compressed without cyclic redundancy. You want to write a method that receives the compressed files and return the uncompressed data as a byte array.What should you do?()A.B.C.D.
You are in the process of creating a new application.This new application has to be able to read all data from a text file.What should you do?() A.B.C.D.
A data warehouse is a subject-oriented data set used for reporting and analusis. Data warehouses can be subdivided into ( ). Which store subsets of data from a warehouse. A、OLTPsB、transactionsC、data sartsD、OLAPs
Which layer in the OSI model is responsible for translating frames into bits?()A、Application LayerB、Presentation LayerC、Data Link LayerD、Physical Layer
You are a database administrator for your company. The company uses a vendor company’s application that is based on a proprietary database. You query data from the application database and import the data into a SQL Server 2005 database. The application vendor provides you with a new OLE DB driver to be used when querying the application database. Company policy prohibits connections between the SQL Server database and the application database, except when querying this data. You need to provide a way to query data from the application database. What should you?()A、Configure a Linked Server connection to the application database.B、Write a query that uses an OPENDATASOURCE command.C、Write a query that uses an OPENQUERY command.D、Configure a Remote Server connection to the application database.
You perform a security audit of a server named DC1. You install the Microsoft Network Monitor 3.0 application on DC1. You plan to capture all the LDAP traffic that comes to and goes from the server between 20:00 and 07:00 the next day and save it to the e:/data.cap file. You create a scheduled task. You add a new Start a program action to the task. You need to add the application name and the application arguments to the new action. What should you do?() A、 Add nmcap.exe as the application name. Add the /networks * /capture LDAP /file e:/data.cap / stopwhen /timeafter 11hours line as argumentsB、 Add netmon.exe as the application name. Add the /networks */capture LDA /file e:/data.cap /stopwhen / T.imeafter 11hours line as argumentsC、 Add nmcap.exe as the application name. Add the /networks * /capture !LDAP /file e:/data.cap /stopwhen /timeafter 11hours line as argumentsD、 Add nmconfig.exe as the application name. Add the /networks */capture LDAP /file e:/data.cap / stopwhen /timeafter 11hours line as arguments
You have a Web application that is configured for personalization. You need to access personalization data from one of the pages of the Web application by using the minimum amount of administrative effort. What should you do? ()A、Access the personalization data from the Session property of the HttpContext object.B、Access the personalization data from the Application property of the HttpContext object.C、Access the personalization data from the Cache property of the HttpContext object.D、Access the personalization data from the Profile property of the HttpContext object.
You run a 16-bit scientific data analysis package on your Windows 2000 Professional computer. Thepackage consists of three components.The first component is a data acquisition application that monitors continuous data output fromscientific instruments. The second component is a data analysis application that receives data from thedata acquisition application by using shared memory. The third component is a data graphingapplication that displays the processed data in real time.The data analysis application communicates with the data graphing application by using OLE. When youattempt to analyze large data sets, your computer is not able to display data in real time. You install asecond processor in your computer. Only one processor is used while the package is running, even thoughtask manager shows both processors.You want your data analysis package to use both processors. What should you do?()A、Configure the data acquisition application to run in its own virtual DOS machine (VDM). B、Configure the data analysis application to run in its own virtual DOS machine (VDM). C、Configure the data graphing application to run in its own virtual DOS machine (VDM). D、Configure the virtual DOS machine for the data acquisition and data analysis applications to have a hard affinity for processor 0. Configure the VDM for the data graphing application to have a hard affinity for processor1. E、Configure the virtual DOS machine for the data acquisition to have a hard affinity for processor 0.Configure the VDM for the data graphing application to have a hard affinity for processor1.
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a management data warehouse that uses the data collector to collect performance data. You intend to maintain the management data. You want to implement a data collection process. The process can gather and upload data in the management data warehouse on different schedules. What process should you implement?() A、You should create a cached data collectionB、You should create an on-demand non-cached data collection C、You should create a scheduled non-cached data collection D、You should create two different SQL Agent jobs that are scheduled stimultaneously
You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application. You use the ClickOnce deployment methodology to distribute the application. You need to store application-specific data along with read/write permissions without requiring elevated permissions for the application. Where should you store the application data?()A、In isolated storage.B、On the database server.C、In the ClickOnce data directory.D、In the App.config file of the application.
单选题Which tier in Oracle E-Business Suite is responsible for storing application data?()Adatabase tierBapplication tierCclient (desktop) tierDboth database tier and application tier
单选题You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application. You use the ClickOnce deployment methodology to distribute the application. You need to store application-specific data along with read/write permissions without requiring elevated permissions for the application. Where should you store the application data?()AIn isolated storage.BOn the database server.CIn the ClickOnce data directory.DIn the App.config file of the application.
单选题You need to base a data block on the EMP table, but you do not want to give the users of the application access privileges on the table. Which type of data source would you use to create the data block?()Atable Btransactional trigger Cstored procedure DFROM clause query
多选题You run a 16-bit scientific data analysis package on your Windows 2000 Professional computer. The package consists of three components. The first component is a data acquisition application that monitors continuous data output from scientific instruments. The second component is a data analysis application that receives data from the data acquisition application by using shared memory. The third component is a data graphing application that displays the processed data in real time. The data analysis application communicates with the data graphing application by using OLE. When you attempt to analyze large data sets, your computer is not able to display data in real time. You install a second processor in your computer; only one processor is used while the package is running, even though task manager shows both processors. You want your data analysis package to use both processors. What should you do?()AConfigure the data acquisition application to run in its own virtual DOS machine (VDM).BConfigure the data analysis application to run in its own virtual DOS machine (VDM).CConfigure the data graphing application to run in its own virtual DOS machine (VDM).DConfigure the virtual DOS machine for the data acquisition and data analysis applications to.have a hard affinity for processor 0. Configure the VDM for the data graphing application to.have a hard affinity for processor1.EConfigure the virtual DOS machine for the data acquisition to have a hard affinity for processor 0. Configure the VDM for the data graphing application to have a hard affinity for processor1.
单选题You create two resource plans, one for data warehouse loading jobs at night and the other for application jobs at day time. You want the resource plans to activate automatically so that the resource allocation is optimum as desired by the activity.How would you achieve this?()AImplement job classesBImplement Scheduler windowsCImplement the mapping rule for the consumer groupsDSet the SWITCH_TIME resource plan directive for both the resource plans
单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a management data warehouse that uses the data collector to collect performance data. You intend to maintain the management data. You want to implement a data collection process. The process can gather and upload data in the management data warehouse on different schedules. What process should you implement?()AYou should create a cached data collectionBYou should create an on-demand non-cached data collection CYou should create a scheduled non-cached data collection DYou should create two different SQL Agent jobs that are scheduled stimultaneously
单选题You create two resource plans,one for data warehouse loading jobs at night and the other for application jobs at day time. You want the resource plans to activate automatically so that the resource allocation is optimum as desired by the activity. How would you achieve this?()A Implement job classesB Implement Scheduler windowsC Implement the mapping rule for the consumer groupsD Set the SWITCH_TIME resource plan directive for both the resource plans
单选题A data warehouse is a subject-oriented data set used for reporting and analusis. Data warehouses can be subdivided into ( ). Which store subsets of data from a warehouse.AOLTPsBtransactionsCdata sartsDOLAPs
单选题You administer a SQL Server 2008 instance. The instance hosts a database that is used by a Web-based application. The application processes 15,000 transactions every minute. A table in the database contains a column that is used only by the application. This column stores sensitive data. You need to store the sensitive data in the most secure manner possible. You also need to ensure that you minimize the usage of memory space and processor time. Which encryption type should you use?()ASymmetric key encryptionBAsymmetric key encryptionCCertificate-based encryptionDTransparent data encryption