单选题An application needs to store a 5 MB JPEG image in a DB2 table. Which data type should be specified for the column that will be used for storing the image?()AGRAPHICBBINARYCIMAGEDBLOB

单选题
An application needs to store a 5 MB JPEG image in a DB2 table. Which data type should be specified for the column that will be used for storing the image?()
A

GRAPHIC

B

BINARY

C

IMAGE

D

BLOB


参考解析

解析: 暂无解析

相关考题:

An application needs to store a 5 MB JPEG image in a DB2 table. Which data type should be specified for the column that will be used for storing the image?() A.GRAPHICB.BINARYC.IMAGED.BLOB

An application architecture specifies the technologies to be used to implement one or more information systems. It serves as an outline for detailed design, construction, and implementation. Given the models and details, include ( ), we can distribute data and processes to create a general design of application architecture. The design will normally be constrained by architecture standards, project objectives, and ( ). The first physical DFD to be drawn is the ( ). The next step is to distribute data stores to different processors. Data( )are two types of distributed data which most RDBMSs support. There are many distribution options used in data distribution. In the case of(请作答此空), we should record each table as a data store on the physical DFD and connect each to the appropriate server.A.storing all data on a single serverB.storing specific tables on different serversC.storing subsets of specific tables on different serversD.duplicating specific tables or subsets on different servers

A technician at TestKing needs to update the network documentation. One of the tasks includes documenting the name of the IOS image file of each router in the network.Which commands could be used to find this information?()A、Router# show protocolsB、Router# show versionC、Router# show imageD、Router# show IOSE、Router# show flash

You need to design the storage of the loan response message. Which actions or actions should you perform?()A、Use the xml data type to store the message.B、Use a user-defined data type to store the message.C、Use the nvarchar(max) data type to store the message.D、Use a check constraint to validate that the correct tags are used.E、Use an XML schema definition (XSD) to validate that the correct tags are used.F、Use a foreign key constraint to validate that the correct tags are used.

For an incomplete recovery, which four backup types can be used by Recovery Manager (RMAN) to restore data files? ()A、RMAN image copiesB、RMAN database backupsC、RMAN tablespace backupsD、user­managed backups placed in the flash recovery areaE、user­managed backups that have been cataloged with RMANF、user­managed data file backups for which the full path name is specified

An application needs to store a 5 MB JPEG image in a DB2 table. Which data type should be specified for the column that will be used for storing the image?()A、GRAPHICB、BINARYC、IMAGED、BLOB

Which three statements are true regarding the data types in Oracle Database 10g/11g?()A、Only one LONG column can be used per table B、A TIMESTAMP data type column stores only time values with fractional seconds C、The BLOB data type column is used to store binary data in an operating system file D、The minimum column width that can be specified for a VARCHAR2 data type column is one E、The value for a CHAR data type column is blank-padded to the maximum defined column width

An application uses Windows Azure Table storage. The application uses five tables.  One table used by the application is approaching the limit for storage requests per second.  You need to recommend an approach for avoiding data access throttling.  What should you recommend?()A、 Use a single partition key for the table.B、 Compress data before storing it in the table.C、 Create additional partition keys for the table.D、 Continually remove unnecessary data from the table.

You work as an Exchange Administrator for TechWorld Inc.The company has a Windows 2008 Active Directory-based contains an Exchange Server 2010 organization.The CIO has requested you to ensure that all emails with JPEG at that they are not allowed into the users’ mailboxes.You decide to use the Exchange Management Shell.Which of t you use to accomplish the task?()A、Add-AttachmentFilterEntry -Name image/jpeg -Type FileNameB、Add-AttachmentFilterEntry -Name *.exe -Type FileNameC、Add-AttachmentFilterEntry -Name image/jpeg -Type ContentTypeD、Add-AttachmentFilterEntry -Name ".jpeg -Type ContentType

You are designing a Windows Azure application that will process images.  The maximum size of an image is 10 MB.   The application includes a web role that allows users to upload images and a worker role with multiple instances that processes the images.   The web role communicates with the worker role by using a Windows Azure Queue.  You need to recommend an approach for storing images that minimizes storage transactions.  What should you recommend? ()A、 Store images in the queue.B、 Store images in Windows Azure Blob storage.  Store references to the images in the queue.C、 Store images in local storage on the web role instance.  Store references to the images in the queue.D、 Store images in Windows Azure Drives attached to the worker role instances. Storereferences to the images in the queue.

You work as an Exchange Administrator for Xxx Inc.The company has a Windows 2008 Active Directorybased network.The network contains an Exchange Server 2010 organization.The CIO has requested you to ensure that all emails with JPEG attachments be filtered so that they are not allowed into the users’ mailboxes.You decide to use the Exchange Management Shell.Which of the following commands will you use to accomplish the task?()A、Add-AttachmentFilterEntry -Name *.jpeg -Type ContentTypeB、Add-AttachmentFilterEntry -Name *.exe -Type FileNameC、Add-AttachmentFilterEntry -Name image/jpeg -Type ContentTypeD、Add-AttachmentFilterEntry -Name image/jpeg -Type FileName

You administer a SQL Server 2008 instance. The instance hosts a database that is used by a Web-based application. The application processes 15,000 transactions every minute. A table in the database contains a column that is used only by the application. This column stores sensitive data. You need to store the sensitive data in the most secure manner possible. You also need to ensure that you minimize the usage of memory space and processor time. Which encryption type should you use?()A、Symmetric key encryptionB、Asymmetric key encryptionC、Certificate-based encryptionD、Transparent data encryption

You work as the application developer at Certkiller .com. Certkiller .com uses Visual Studio.NET 2005 as its application development platform.You are developing a .NET Framework 2.0 application used to store a type-safe list of names and e-mail addresses. The list will be populated all at ones from the sorted data which means you well not always need to perform insertion or deletion operations on the data. You are required to choose a data structure that optimizes memory use and has good performance.What should you do?()A、 The System.Collections.Generic.SortedList class should be usedB、 The System.Collections.HashTable class should be usedC、 The System.Collections.Generic.SortedDictionary class should be usedD、 The System.Collections.SortedList class should be used

You work as an application developer at CER-Tech.com. Cert-Tech.com uses Visual studio.NET 2005 as its Application Development platform.You are developing a .NET Framework 2.0 application used to store a type-safe list of names and e-mail addresses. The list will be populated all at ones from the sorted data which means you will not always need to perform insertion or deletion operations on the data. You are required to choose a data structure that optimizes memory use and has good performance.What should you do?()A、 The System.Collections.Generic.SortedList class should be used B、 The System.Collections.HashTable class should be usedC、 The System.Collections.Generic.SortedDictionary class should be used D、 The System.Collections.SortedList class should be used

You are designing a Windows Azure application that will allow for the processing of image files. Images will be processed in batches by remote applications running on multiple servers.  The application must meet the following requirements:   - Remain operational during batch-processing operations. - Allow users to roll back each image to previous versions.    Each remote application must have exclusive access to an image while processing it. You need to recommend an approach for storing the images.  What should you recommend?()A、 Store the images in a Windows Azure Queue.B、 Store theimages in Windows Azure Blob storage.C、 Store the images in Windows Azure Table storage.D、 Store images in a single Windows Azure Drive attached to the web role.

Your company plans to upgrade all client computers to Windows 7.   The company uses a custom line-of-business application. The application contains sensitive data.  The application will not run on Windows 7  You establish that Microsoft Enterprise Desktop Virtualization (MED-V) v2 is the appropriate technology to allow your organization to continue to use the application.    You need to ensure that the virtual machine (VM) images that contain sensitive data can be used only when the user is connected to the MED-V server.  What should you do?()A、Use BitLocker Drive Encryption to encrypt the drive on which the VM image is stored.B、In the MED-V console, configure the MED-V workspace to prevent offline operation.C、Using MED-V TrimTransfer technology, deploy the VM image over the network.D、Using Microsoft System Center Configuration Manager, deploy the VM image to an image store directory.

单选题Your company plans to upgrade all client computers to Windows 7.   The company uses a custom line-of-business application. The application contains sensitive data.  The application will not run on Windows 7  You establish that Microsoft Enterprise Desktop Virtualization (MED-V) v2 is the appropriate technology to allow your organization to continue to use the application.    You need to ensure that the virtual machine (VM) images that contain sensitive data can be used only when the user is connected to the MED-V server.  What should you do?()AUse BitLocker Drive Encryption to encrypt the drive on which the VM image is stored.BIn the MED-V console, configure the MED-V workspace to prevent offline operation.CUsing MED-V TrimTransfer technology, deploy the VM image over the network.DUsing Microsoft System Center Configuration Manager, deploy the VM image to an image store directory.

单选题You work as an Exchange Administrator for TechWorld Inc.The company has a Windows 2008 Active Directory-based contains an Exchange Server 2010 organization.The CIO has requested you to ensure that all emails with JPEG at that they are not allowed into the users’ mailboxes.You decide to use the Exchange Management Shell.Which of t you use to accomplish the task?()AAdd-AttachmentFilterEntry -Name image/jpeg -Type FileNameBAdd-AttachmentFilterEntry -Name *.exe -Type FileNameCAdd-AttachmentFilterEntry -Name image/jpeg -Type ContentTypeDAdd-AttachmentFilterEntry -Name .jpeg -Type ContentType

多选题Which three statements are true regarding the data types in Oracle Database 10g/11g?()AOnly one LONG column can be used per tableBA TIMESTAMP data type column stores only time values with fractional secondsCThe BLOB data type column is used to store binary data in an operating system fileDThe minimum column width that can be specified for a VARCHAR2 data type column is oneEThe value for a CHAR data type column is blank-padded to the maximum defined column width

单选题You work as an Exchange Administrator for Xxx Inc.The company has a Windows 2008 Active Directorybased network.The network contains an Exchange Server 2010 organization.The CIO has requested you to ensure that all emails with JPEG attachments be filtered so that they are not allowed into the users’ mailboxes.You decide to use the Exchange Management Shell.Which of the following commands will you use to accomplish the task?()AAdd-AttachmentFilterEntry -Name *.jpeg -Type ContentTypeBAdd-AttachmentFilterEntry -Name *.exe -Type FileNameCAdd-AttachmentFilterEntry -Name image/jpeg -Type ContentTypeDAdd-AttachmentFilterEntry -Name image/jpeg -Type FileName

单选题You are designing a Windows Azure application that will allow for the processing of image files. Images will be processed in batches by remote applications running on multiple servers.  The application must meet the following requirements:   - Remain operational during batch-processing operations. - Allow users to roll back each image to previous versions.    Each remote application must have exclusive access to an image while processing it. You need to recommend an approach for storing the images.  What should you recommend?()A Store the images in a Windows Azure Queue.B Store theimages in Windows Azure Blob storage.C Store the images in Windows Azure Table storage.D Store images in a single Windows Azure Drive attached to the web role.

单选题You are designing a Windows Azure application that will process images.  The maximum size of an image is 10 MB.   The application includes a web role that allows users to upload images and a worker role with multiple instances that processes the images.   The web role communicates with the worker role by using a Windows Azure Queue.  You need to recommend an approach for storing images that minimizes storage transactions.  What should you recommend? ()A Store images in the queue.B Store images in Windows Azure Blob storage.  Store references to the images in the queue.C Store images in local storage on the web role instance.  Store references to the images in the queue.D Store images in Windows Azure Drives attached to the worker role instances. Storereferences to the images in the queue.

单选题You work as an application developer at CER-Tech.com. Cert-Tech.com uses Visual studio.NET 2005 as its Application Development platform.You are developing a .NET Framework 2.0 application used to store a type-safe list of names and e-mail addresses. The list will be populated all at ones from the sorted data which means you will not always need to perform insertion or deletion operations on the data. You are required to choose a data structure that optimizes memory use and has good performance.What should you do?()A The System.Collections.Generic.SortedList class should be used B The System.Collections.HashTable class should be usedC The System.Collections.Generic.SortedDictionary class should be used D The System.Collections.SortedList class should be used

多选题For an incomplete recovery, which four backup types can be used by Recovery Manager (RMAN) to restore data files? ()ARMAN image copiesBRMAN database backupsCRMAN tablespace backupsDuser­managed backups placed in the flash recovery areaEuser­managed backups that have been cataloged with RMANFuser­managed data file backups for which the full path name is specified

单选题You administer a SQL Server 2008 instance. The instance hosts a database that is used by a Web-based application. The application processes 15,000 transactions every minute. A table in the database contains a column that is used only by the application. This column stores sensitive data. You need to store the sensitive data in the most secure manner possible. You also need to ensure that you minimize the usage of memory space and processor time. Which encryption type should you use?()ASymmetric key encryptionBAsymmetric key encryptionCCertificate-based encryptionDTransparent data encryption

单选题An application uses Windows Azure Table storage. The application uses five tables.  One table used by the application is approaching the limit for storage requests per second.  You need to recommend an approach for avoiding data access throttling.  What should you recommend?()A Use a single partition key for the table.B Compress data before storing it in the table.C Create additional partition keys for the table.D Continually remove unnecessary data from the table.

单选题In addition to the partition profile backup, how should the HMC be backed up to provide bare-metal restore capabilities?()ABackup critical console dataBBackup a bootable image to tapeCCreate mksysb image and store on a NIM serverDCreate mksysb image and store on an NFS server