单选题You want to access employee details contained in flat files as part of the EMPLOYEE table. You plan to add anew column to the EMPLOYEE table to achieve this.  Which data type would you use for the new column()ACLOBBBLOBCBFILEDLONG RAW

单选题
You want to access employee details contained in flat files as part of the EMPLOYEE table. You plan to add anew column to the EMPLOYEE table to achieve this.  Which data type would you use for the new column()
A

CLOB

B

BLOB

C

BFILE

D

LONG RAW


参考解析

解析: 暂无解析

相关考题:

You are the administrator of several SQL Server 2000 computers. A data Transformation Services (DTS) package uses native OLE DB providers to transfer data between the servers. Connection details for the servers are specified in .udl files. The .udl files are frequently updated as connection details change.You want to distribute the DTS package as a file to developers in your company. You want to make sure connection details are available to developers who receive the DTS package.Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two)A.Enable the Always read properties from UDL file option in the Connection Properties dialog box.B.Disable the Always read properties from UDL file option in the Connection Properties dialog box.C.Delete the .udl files and store connection details in the registry by using system data source names.D.Delete the .udl files, and store connection details in the registry by using user data source names.E.Make the .udl files available on a network share.

You are the administrator of your company's network. An employee named Mark is leaving the company. A new employee named Eric has been hired to replace him.Mark has a local user account on a Windows 2000 Professional computer. Mark has rights to multiple files and folders on the computer.You want Eric to have the same rights and permissions that Mark has. You want to ensure that Mark will no longer have access to the files and folders. You want to accomplish this with least administrative effort.What should you do?A.Rename Mark's user account to Eric and change the account password.B.Create Eric's account by copying Mark's profile to Eric's account. Delete Mark's account.C.Create Eric's account by copying Marks account. Delete Mark's account.D.Delete Mark's account. Add Eric's account. Add Eric to the same groups to which Mark belonged. Grant Eric to all the individual user rights and permissions that Mark had.

What are two indicators that a customer should consider the installation of a Wireless LAN Controller? ()A、need one access pointB、want to provide unsecured wireless accessC、need between two and three access pointsD、want to provide employee wireless accessE、need more than four access pointsF、want to provide guest wireless access

You are using flat files as the data source for one of your data warehousing applications. To optimize the application performance, you plan to move the data from the flat files to clustered tables in an Oracle database.While migrating the data, you want to have minimal impact on the database performance and optimize the dataload operation.  Which method would you use to load data into the Oracle database()A、Use the external table population.B、Use the Oracle Data Pump export and import utility.C、Use the conventional path data load of the SQL*Loader utility.D、Use the INSERT INTO...SELECT command to load the data

In which scenario would TOP N analysis be the best solution?()A、You want to identify the most senior employee in the company.B、You want to find the manager supervising the largest number of employees.C、You want to identify the person who makes the highest salary for all employees.D、You want to rank the top three sales representatives who have sold the maximum number of products.

You are the administrator of your company’s network. An employee named Mark is leaving the company. A new employee named Eric has been hired to replace him. Mark has a local user account on a Windows 2000 Professional computer. Mark has rights to multiple files and folders on the computer.  You want Eric to have the same rights and permissions that Mark has. You want to ensure that Mark will no longer have access to the files and folders. You want to accomplish this with least administrative effort. What should you do?()A、Rename Mark’s user account to Eric and change the account password.B、Create Eric’s account by copying Mark’s profile to Eric’s account. Delete Mark’s account.C、Create Eric’s account by copying Marks account. Delete Mark’s account.D、Delete Mark’s account. Add Eric’s account. Add Eric to the same groups to which Mark belonged. Grant Eric to all the individual user rights and permissions that Mark had.

You acquire a pc with 3 hard drives: Disk 0, Disk 1, Disk 2. Each physical disk has a capacity of 6GB. You want each disk to consist of one partition. You want to configure the computer to dual-boot Win98 and Win2K PRO. You want to save your documents to Disk 1 and have the ability to access them under either OS. You also want to install Win2K PRO and have the ability to secure individual files on Disk 2.

You recently upgraded all Windows NT Workstation 4.0 computers to Windows 2000 Professional. You want to give a new employee named Maria the ability to back up files, share resources, and install programs on a client computer that she shares with other users. You do not want Maria to be able to read other users’ files.   What should you do to accomplish these goals?()A、Add Maria’s user account to the system group.B、Add Maria’s user account to the interactive group.C、Add Maria’s user account to the power user group.D、Add Maria’s user account to the administrators group.E、Add Maria’s user account to the Backup Operators group.

You use a Windows 2000 Professional computer.You are responsible for maintaining Company’s client contact list. You want other users on the networkto be able to read the client contact list. You use Windows Explorer to share the client contact list folderon the network.You want users touse the most current available information when contacting clients. You want toprevent users from enabling offline access for the network share that contains the client contact list.What should you do?()A、Use Synchronization Manager to configure synchronization not to occur when users are connected to the LAN connection.B、Use Windows Explorer to grant users Special access for the reports on the network share.C、Use Windows Explorer to disable caching for the reports on the network share.D、Use Windows Explorer to disable Offline files.

You have 30 NT 4.0 machines and 5 W2k Pro machines on your network. You want to share files on the W2kPro machines that only they can access. The NT 4 machines must not be able to access those shared files at all? ()A、You should import hisecws.inf security template.B、You should import hisecdc.inf security template.C、You should import securews.inf security template.D、You should import compatws.inf security template.

You want to configure your Windows 2000 Professional portable computer to use offline files. The files that you want to access offline include a large project file and some smaller personal files. Your portable computer is configured to connect to the network by using the dial up connection at scheduled times during day to automatically download your e-mail messages. You do not want to synchronize the project file when you connect to the network using the dial-up connection. What you should do?()A、Configure the Synchronization Settings to perform a quick synchronization. B、Configure the Synchronization Settings to ask you before synchronizing items. C、Configure the Synchronization Settings to synchronize the project file only when using the LAN connection. Set synchronization for the personal files for both the LAN connection and your dial-up connection. D、Set the synchronization settings to synchronize the project file only when you log off the network. Set synchronization for the personnel files for both the LAN and dialup connection for logging on and logging off.

You design a Business Intelligence (BI) solution by using SQL Server 2008. You create a SQL Server 2008 Reporting Services (SSRS) solution. The solution contains a report named Sales Details that displays sales information of all the employees. You create an SSRS report named Sales Summary that displays the total monthly sales of each employee. Users who view the Sales Summary report occasionally require the monthly sales details for a particular employee. You need to ensure that the users can click a value in the month column of the Sales Summary report to open and render the Sales Details report. What should you do?()A、 Use a subreport.B、 Use a bookmark link.C、 Use the drilldown functionality.D、 Use a drillthrough report link.

单选题Every morning, you inspect your company's development and staging servers. You do this to ensure that the servers have the same versions of all files in your Web application.For security reasons, you can only access the staging server through FTP.You need to synchronize files from the staging server so that the staging server matches the development server.You want to achieve this goal by using the minimum amount of administrative effort. Which tool should you use?()AFTPBXCOPYCthe Publish Web toolDthe Copy Web tool

单选题You are using flat files as the data source for one of your data warehousing applications. To optimizethe application performance, you plan to move the data from the flat files toclustered tablesin an Oracle database.  While migrating the data, you want to have minimal impact on the database performance and optimize thedata load operation. Which method would you use to load data into the Oracle database()AUse the external table population.BUse the Oracle Data Pump export and import utility.CUse the conventional path data load of the SQL*Loader utility.DUse the INSERT INTO...SELECT command to load the data.

单选题An employee named Drew is leaving your company. A new employee named Adam will replace him. Drew has a local user account on a Windows 2000 Professional computer, with rights and permissions to multiple files and folders on the computer. You want Adam to have the same rights and permissions. How will you achieve this with the least administrative efforts? ()ARename Drew’s user account to Adam, and change the account password.BCreate a new account and link it to the previous users account.CDelete the account and create a new one.DAdd a new user account to all the groups that the previous employee was added.

多选题You configure your Windows 2000 Professional portable computer to redirect your My Documents folder to your home folder. You want to ensure that you can access all of your files in you’re my Documents folder when you are not connected to the network. What should you do?()AUse Windows Explorer to enable offline files.BUse Windows Explorer to create shortcut to access offline files folder as desktop.CUse Windows Explorer to configure the properties of your home folder to be available offline.DUse synchronization manager to configure your home folder to be available offline.ECreate a shortcut in my network places to access your home folder.

多选题You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()ASelect Require and Enforce for the Host Checker Policy in the realm authentication policy.BSelect Evaluate Policies for the Host Checker policy in the realm authentication policy.CConfigure the Host Checker policy as a role restriction for the Employee role.DConfigure the Host Checker policy as a resource access policy for the Employee role.

单选题You are a security administrator for your company. The network consists of a single Active  Directory domain. All servers run Windows Server 2003. All client computers run Windows 2000 Professional.   You manage a Windows Server 2003 computer named Server1 that is a domain member server. You use IIS on Server1 to host an Internet Web site. Approximately 4,000 employees of your company connect over the lnternet to access company confidential data on Server1. You control access to data on Server1 by using NTFS file permissions assigned to groups. Different groups are assigned access to different files. Employees must have access only to files that they are assigned access to based on their membership in a group. You enable SSL on Server1 to protect confidential data while it is in transit. You issue each employee an Authenticated Session certificate and store a copy of that certificate with their user account in the Active Directory domain.    You need to ensure that Server1 authenticates users based on possession of their certificate.  What should you do?()A Request a Web server certificate from a commercial certification authority (CA).B Configure access restrictions based on employee ip address.C Enable Digest authentication for Windows domain servers.D Configure client certificate mapping.

单选题You are the network administrator for ExamSheet. Your Windows 2000 Professional computer contains a single hard disk configured with two NTFS partitions C and D. You want to move a folder named Sales from the C partition to a folder named Corp on the D partition.  You want the files in the Sales folder to still be compressed after moving the folder. You want the files in the Corp folder to remain uncompressed. You want to ensure that the files are recoverable in case of any disk problems. You also want to move the files with the least amount of administrative effort.   What should you do?()ABack up the Sales Folder. Move the Sales folder to the Corp folder. Compress the Sales folderBBack up the Sales folder. Copy the Sales folder to the Corp folderCCopy the Sales folder to a second computer. Then move the Sales folder to the Corp folderDRun the commandxcopy.exe c:/Sales d:/Corp /S /C

单选题You want to access employee details contained in flat files as part of the EMPLOYEE table. You planto add a new column to the EMPLOYEE table to achieve this.  Which data type would you use for the new column()ACLOBBBLOBCBFILEDLONG RAW

多选题You are the network administrator for ExamSheet.net. Your network has 210 Windows 2000 Professional computers and eleven Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Sandra leaves ExamSheet.net. You decrypt the files for her manager. When the manager attempts to open any of the files, he receives the following error message: "Access is denied." You want the manager to be able to access the files.  What should do? ()AMove the files from Sandra’s folder to the manager’s folder.BGrant the manager NTFSFull Controlpermission to the files.CRun theciphercommand to create a new file encryption key for the manager.DRun theciphercommand to generate an EFS recovery agent key and certificate.EGrant the manager NTFSList Folder Contentspermissions to the folder containing Sandra’s files.

问答题You acquire a pc with 3 hard drives: Disk 0, Disk 1, Disk 2. Each physical disk has a capacity of 6GB. You want each disk to consist of one partition. You want to configure the computer to dual-boot Win98 and Win2K PRO. You want to save your documents to Disk 1 and have the ability to access them under either OS. You also want to install Win2K PRO and have the ability to secure individual files on Disk 2.

单选题You are the administrator of your company’s network. Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled.   A user named John leaves the company. You move all of the files from John’s home folder to his manager’s folder. When the manager attempts to open any of the files, she receives the following error message. “Access denied.”   You want the manager to be able to access the files. What should you do?()AGrant the manager NTFS Full Control permission to the files.BGrant the manager NTFS Take Ownership permission to the files.CLog on to the network as a recovery Agent.  Decrypt the files for the manager.DLog on to the network as a member of the Backup Operators group. Decrypt the files for the manager.

单选题You are using flat files as the data source for one of your data warehousing applications. You plan to move the data from the flat file structures to an Oracle database to optimize the application performance. In your database you have clustered tables.  While migrating the data, you want to have minimal impact on the database performance and optimize the data load operation. Which method would you use to load data into Oracle database?()Ause the external table populationBuse the Oracle Data Pump export and import utilityCuse the conventional path data load of SQL*Loader utilityDuse the direct path data load of Oracle export and import utility

单选题Your Windows 2000 Professional computer contains a single hard disk configured as a single partition. You want to move a folder named Sales under a folder named Corp on your computer.  You want the files in the Sales folder to remain compressed after moving the folder. You want the files in the Corp folder to remain uncompressed. You want to ensure that the files are recoverable in case of any disk problems. You also want to move the files with the least amount of administrative effort.   What should you do?()ACopy the Sales folder to the Corp folder. Do nothing further.BBackup the Sales folder. Move the Sales folder to the Corp folder.CCompress the Corp folder. Then copy the Sales folder to the Corp folder.DMove the Sales folder to a second computer. Then move the Sales folder to the Corp folder.

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.   You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users.   What should you do?  ()A Configure the system event log to Do not overwrite.B In IAS, in Remote Access Logging, enable the Authentication requests setting.C Configure the Remote Access server to Log all events.D Create a custom remote access policy and configure it for Authentication-Type.