An application needs to store a 5 MB JPEG image in a DB2 table. Which data type should be specified for the column that will be used for storing the image?()A、GRAPHICB、BINARYC、IMAGED、BLOB

An application needs to store a 5 MB JPEG image in a DB2 table. Which data type should be specified for the column that will be used for storing the image?()

  • A、GRAPHIC
  • B、BINARY
  • C、IMAGE
  • D、BLOB

相关考题:

An application needs to store a 5 MB JPEG image in a DB2 table. Which data type should be specified for the column that will be used for storing the image?() A.GRAPHICB.BINARYC.IMAGED.BLOB

A technician at TestKing needs to update the network documentation. One of the tasks includes documenting the name of the IOS image file of each router in the network.Which commands could be used to find this information?()A. Router# show protocolsB. Router# show versionC. Router# show imageD. Router# show IOSE. Router# show flash

An application architecture specifies the technologies to be used to implement one or more information systems. It serves as an outline for detailed design, construction, and implementation. Given the models and details, include ( ), we can distribute data and processes to create a general design of application architecture. The design will normally be constrained by architecture standards, project objectives, and ( ). The first physical DFD to be drawn is the ( ). The next step is to distribute data stores to different processors. Data( )are two types of distributed data which most RDBMSs support. There are many distribution options used in data distribution. In the case of(请作答此空), we should record each table as a data store on the physical DFD and connect each to the appropriate server.A.storing all data on a single serverB.storing specific tables on different serversC.storing subsets of specific tables on different serversD.duplicating specific tables or subsets on different servers

A technician at TestKing needs to update the network documentation. One of the tasks includes documenting the name of the IOS image file of each router in the network.Which commands could be used to find this information?()A、Router# show protocolsB、Router# show versionC、Router# show imageD、Router# show IOSE、Router# show flash

Which of the following commands will display the name of the IOS image file being used in a Cisco router?()A、Router# show IOSB、Router# show versionC、Router# show imageD、Router# show protocolsE、Router# show flash

In addition to the partition profile backup, how should the HMC be backed up to provide bare-metal restore capabilities?()A、Backup critical console dataB、Backup a bootable image to tapeC、Create mksysb image and store on a NIM serverD、Create mksysb image and store on an NFS server

You need to design the storage of the loan response message. Which actions or actions should you perform?()A、Use the xml data type to store the message.B、Use a user-defined data type to store the message.C、Use the nvarchar(max) data type to store the message.D、Use a check constraint to validate that the correct tags are used.E、Use an XML schema definition (XSD) to validate that the correct tags are used.F、Use a foreign key constraint to validate that the correct tags are used.

For an incomplete recovery, which four backup types can be used by Recovery Manager (RMAN) to restore data files? ()A、RMAN image copiesB、RMAN database backupsC、RMAN tablespace backupsD、user­managed backups placed in the flash recovery areaE、user­managed backups that have been cataloged with RMANF、user­managed data file backups for which the full path name is specified

A system administrator has an existing mksysb image, but would like to modify the image.data file on the mksysb before installing it on a system. Which of the following procedures is most appropriate to perform?()A、Create a new image.data file and recreate the mksysb image.B、Use the dd command to replace the image.data file on the mksysb tape.C、Use the tctl command to palce the new image.data file on the mksysb tape.D、Place the new image.data file on a diskette that will be road during the installation of the mksysb.

Which three statements are true regarding the data types in Oracle Database 10g/11g?()A、Only one LONG column can be used per table B、A TIMESTAMP data type column stores only time values with fractional seconds C、The BLOB data type column is used to store binary data in an operating system file D、The minimum column width that can be specified for a VARCHAR2 data type column is one E、The value for a CHAR data type column is blank-padded to the maximum defined column width

An application uses Windows Azure Table storage. The application uses five tables.  One table used by the application is approaching the limit for storage requests per second.  You need to recommend an approach for avoiding data access throttling.  What should you recommend?()A、 Use a single partition key for the table.B、 Compress data before storing it in the table.C、 Create additional partition keys for the table.D、 Continually remove unnecessary data from the table.

You work as an Exchange Administrator for TechWorld Inc.The company has a Windows 2008 Active Directory-based contains an Exchange Server 2010 organization.The CIO has requested you to ensure that all emails with JPEG at that they are not allowed into the users’ mailboxes.You decide to use the Exchange Management Shell.Which of t you use to accomplish the task?()A、Add-AttachmentFilterEntry -Name image/jpeg -Type FileNameB、Add-AttachmentFilterEntry -Name *.exe -Type FileNameC、Add-AttachmentFilterEntry -Name image/jpeg -Type ContentTypeD、Add-AttachmentFilterEntry -Name ".jpeg -Type ContentType

You are designing a Windows Azure application that will process images.  The maximum size of an image is 10 MB.   The application includes a web role that allows users to upload images and a worker role with multiple instances that processes the images.   The web role communicates with the worker role by using a Windows Azure Queue.  You need to recommend an approach for storing images that minimizes storage transactions.  What should you recommend? ()A、 Store images in the queue.B、 Store images in Windows Azure Blob storage.  Store references to the images in the queue.C、 Store images in local storage on the web role instance.  Store references to the images in the queue.D、 Store images in Windows Azure Drives attached to the worker role instances. Storereferences to the images in the queue.

You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application that displays an image. You need to ensure that users can stretch and scale the image. Which control should you use?()A、FrameB、SliderC、ViewboxD、ScrollViewer

You work as an Exchange Administrator for Xxx Inc.The company has a Windows 2008 Active Directorybased network.The network contains an Exchange Server 2010 organization.The CIO has requested you to ensure that all emails with JPEG attachments be filtered so that they are not allowed into the users’ mailboxes.You decide to use the Exchange Management Shell.Which of the following commands will you use to accomplish the task?()A、Add-AttachmentFilterEntry -Name *.jpeg -Type ContentTypeB、Add-AttachmentFilterEntry -Name *.exe -Type FileNameC、Add-AttachmentFilterEntry -Name image/jpeg -Type ContentTypeD、Add-AttachmentFilterEntry -Name image/jpeg -Type FileName

You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. A SQL Server 2005 application is utilized by the company. A query is executed by the application to return three columns of the nvarchar data type and one column of the XML data type. A WHERE clause is utilized by the query, and all three of the nvarchar columns are contained by the WHERE clause. 5 million rows are included by the table, and 50,000 rows are returned by the query. The performance of the query should be enhanced. Which action should be performed to achieve the goal?()A、A primary XML index should be created on the XML column.B、Statistics should be created on the nvarchar columns.C、A view should be created, and only the four columns that the query utilizes are contained by a view.D、A composite index should be created on the three nvarchar columns, and INCLUDE should be specified for the XML column.

You administer a SQL Server 2008 instance. The instance hosts a database that is used by a Web-based application. The application processes 15,000 transactions every minute. A table in the database contains a column that is used only by the application. This column stores sensitive data. You need to store the sensitive data in the most secure manner possible. You also need to ensure that you minimize the usage of memory space and processor time. Which encryption type should you use?()A、Symmetric key encryptionB、Asymmetric key encryptionC、Certificate-based encryptionD、Transparent data encryption

You work as the application developer at Certkiller .com. Certkiller .com uses Visual Studio.NET 2005 as its application development platform.You are developing a .NET Framework 2.0 application used to store a type-safe list of names and e-mail addresses. The list will be populated all at ones from the sorted data which means you well not always need to perform insertion or deletion operations on the data. You are required to choose a data structure that optimizes memory use and has good performance.What should you do?()A、 The System.Collections.Generic.SortedList class should be usedB、 The System.Collections.HashTable class should be usedC、 The System.Collections.Generic.SortedDictionary class should be usedD、 The System.Collections.SortedList class should be used

You work as an application developer at CER-Tech.com. Cert-Tech.com uses Visual studio.NET 2005 as its Application Development platform.You are developing a .NET Framework 2.0 application used to store a type-safe list of names and e-mail addresses. The list will be populated all at ones from the sorted data which means you will not always need to perform insertion or deletion operations on the data. You are required to choose a data structure that optimizes memory use and has good performance.What should you do?()A、 The System.Collections.Generic.SortedList class should be used B、 The System.Collections.HashTable class should be usedC、 The System.Collections.Generic.SortedDictionary class should be used D、 The System.Collections.SortedList class should be used

You are designing a Windows Azure application that will allow for the processing of image files. Images will be processed in batches by remote applications running on multiple servers.  The application must meet the following requirements:   - Remain operational during batch-processing operations. - Allow users to roll back each image to previous versions.    Each remote application must have exclusive access to an image while processing it. You need to recommend an approach for storing the images.  What should you recommend?()A、 Store the images in a Windows Azure Queue.B、 Store theimages in Windows Azure Blob storage.C、 Store the images in Windows Azure Table storage.D、 Store images in a single Windows Azure Drive attached to the web role.

Your company plans to upgrade all client computers to Windows 7.   The company uses a custom line-of-business application. The application contains sensitive data.  The application will not run on Windows 7  You establish that Microsoft Enterprise Desktop Virtualization (MED-V) v2 is the appropriate technology to allow your organization to continue to use the application.    You need to ensure that the virtual machine (VM) images that contain sensitive data can be used only when the user is connected to the MED-V server.  What should you do?()A、Use BitLocker Drive Encryption to encrypt the drive on which the VM image is stored.B、In the MED-V console, configure the MED-V workspace to prevent offline operation.C、Using MED-V TrimTransfer technology, deploy the VM image over the network.D、Using Microsoft System Center Configuration Manager, deploy the VM image to an image store directory.

单选题An application needs to store a 5 MB JPEG image in a DB2 table. Which data type should be specified for the column that will be used for storing the image?()AGRAPHICBBINARYCIMAGEDBLOB

多选题Which three statements are true regarding the data types in Oracle Database 10g/11g?()AOnly one LONG column can be used per tableBA TIMESTAMP data type column stores only time values with fractional secondsCThe BLOB data type column is used to store binary data in an operating system fileDThe minimum column width that can be specified for a VARCHAR2 data type column is oneEThe value for a CHAR data type column is blank-padded to the maximum defined column width

单选题You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. A SQL Server 2005 application is utilized by the company. A query is executed by the application to return three columns of the nvarchar data type and one column of the XML data type. A WHERE clause is utilized by the query, and all three of the nvarchar columns are contained by the WHERE clause. 5 million rows are included by the table, and 50,000 rows are returned by the query. The performance of the query should be enhanced. Which action should be performed to achieve the goal?()AA primary XML index should be created on the XML column.BStatistics should be created on the nvarchar columns.CA view should be created, and only the four columns that the query utilizes are contained by a view.DA composite index should be created on the three nvarchar columns, and INCLUDE should be specified for the XML column.

单选题You work as the application developer at Certkiller .com. Certkiller .com uses Visual Studio.NET 2005 as its application development platform.You are developing a .NET Framework 2.0 application used to store a type-safe list of names and e-mail addresses. The list will be populated all at ones from the sorted data which means you well not always need to perform insertion or deletion operations on the data. You are required to choose a data structure that optimizes memory use and has good performance.What should you do?()A The System.Collections.Generic.SortedList class should be usedB The System.Collections.HashTable class should be usedC The System.Collections.Generic.SortedDictionary class should be usedD The System.Collections.SortedList class should be used

多选题For an incomplete recovery, which four backup types can be used by Recovery Manager (RMAN) to restore data files? ()ARMAN image copiesBRMAN database backupsCRMAN tablespace backupsDuser­managed backups placed in the flash recovery areaEuser­managed backups that have been cataloged with RMANFuser­managed data file backups for which the full path name is specified

多选题For an incomplete recovery, which four backup types can be used by Recovery Manager (RMAN) to restore data files?()ARMAN image copies.BRMAN database backups.CRMAN tablespace backups.DUser-managed backups placed in the flash recovery area.EUser-managed backups that have been cataloged with RMAN.FUser-managed data file backups for which the pull path name is specified.