The supplement to the IOPP Certificate contains what type of data ________.A.The grades of cargo that an oil tanker is permitted to carryB.A checklist of the equipment installed for controlling the discharge of oilC.The trade routes upon which the vessel may operateD.A list of the underwriters who will assume financial responsibility in the event of an oil spill

The supplement to the IOPP Certificate contains what type of data ________.

A.The grades of cargo that an oil tanker is permitted to carry

B.A checklist of the equipment installed for controlling the discharge of oil

C.The trade routes upon which the vessel may operate

D.A list of the underwriters who will assume financial responsibility in the event of an oil spill


相关考题:

A UDT is a data type which:() A.must contain unique values.B.cannot be CAST to other data types.C.is created using the CREATE DISTINCT command.D.contains a value that was automatically calculated from values in other columns.

As a frame leaves a Layer 3 device, the Layer 2 encapsulation information is changed from what it was when it entered the devicE.For what two reasons can this happen? () A.The data is moving from 10BASE-TX to 100BASE-TX.B.The WAN encapsulation type has changed.C.The data format has changed from analog to digital.D.The source and destination hosts are in the same subnet.E.The source and destination MAC addresses have changed.

After an IOPP Certificate is issued to an inspected vessel,how many other surveys of the vessel's pollution prevention equipment are conducted during the period of validity of the certificate?A.NoneB.OneC.TwoD.Three

In which case is the IOPP Certificate of an inspected vessel NOT invalidated?A.The required oily-water separator malfunctionsB.The ship is transferred to Liberian registryC.An annual survey is conducted fifteen months after the date of certificate issuanceD.A 15 ppm oily-water separator is replaced by a 100 ppm oily-water separator

The annual survey for endorsement of a Load Line Certificate must be held within ______.A.the three month period immediately following the certificate's anniversary dateB.the three month period immediately preceding the certificate's anniversary dateC.three months either way of the certificate's anniversary dateD.the three month period centered on the certificate's anniversary date

What is the most important difference between the bow type anchor shackle and the D-type anchor shackle?A.The bow type shackle provides a superior connectionB.The D-type shackle is weaker than the bow typeC.The bow type shackle is weaker than the D-typeD.The D-type shackle provides an inferior connection

A UDT is a data type which:()A、must contain unique values.B、cannot be CAST to other data types.C、is created using the CREATE DISTINCT command.D、contains a value that was automatically calculated from values in other columns.

Data deduplication ratios depend on many factors. However, deduplication ratios are generallygreater for what type of data?()A、encrypted dataB、compressed dataC、archive dataD、multiplexed data streams

Your network contains a Web server named Server1 that runs Windows Server 2003 and Internet Information Server (IIS). Server1 has a server certificate from an Enterprise Certificate Authority (CA) installed. External users report that when they try to access the Web site from outside the corporate network by using a Web browser, they receive the following warning message: There is a problem with this Web sites security certificate. The security certificate presented by this Web site was not issued by a trusted certificate authority. You find that users onthe corporate network do not receive this error. You need to ensure that external users do not receive the warning message when connecting to Server1.   What should you do?()A、In IIS Manager, enable the Enable client certificate mapping option.B、In IIS Manager, replace the certificate with a certificate obtained from a public Certification Authority.C、In Local Security Policy, enable Domain Member: Require strong (Windows 2000 or later) session key.D、In Local Security Policy, enable Domain Member: Digitally encrypt or sign secure channel data (always).

Windows Communication Foundation (WCF) application uses a data contract that has several data members. You need the application to throw a Serialization Exception if any of the data members are not present when a serialized instance of the data contract is deserialized. What should you do?()A、 Add the Known Type attribute to the data contract.Set a default value in each of the data member declarations.B、 Add the Known Type attribute to the data contract.Set the Order property of each data member to unique integer value.C、 Set the Emit Default Value property of each data member to false.D、 Set the Is Required property of each data member to true.

You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application. The application has multiple data entry windows. Each window contains controls that allow the user to type different addresses for shipping and mailing. All addresses have the same format. You need to ensure that you can reuse the controls. What should you create?()A、a user controlB、a data templateC、a control templateD、a control that inherits the Canvas class

You are developing an ASP.NET Web application. The application must pass an object that contains user-specific data between multiple pages. The object ismore than 100 KB in size when serialized.You need to minimize the amount of data is sent to the user. What should you do?()A、Pass the object data in a hidden field.B、Store the object instance in a session variable.C、Use a cookie that contains the object data.D、Encode the object data and pass it in a query string parameter.

You design a Business Intelligence (BI) solution by using SQL Server 2008. The solution includes a SQL Server 2008 Analysis Services (SSAS) database. The database contains a data mining structure that uses a SQL Server 2008 table as a data source. A table named OrderDetails contains detailed information on product sales. The OrderDetails table includes a column named Markup. You build a data mining model by using the Microsoft Decision Trees algorithm. You classify Markup as discretized content.  The algorithm produces a large number of branches for Markup and results in low confidence ratings on predictable columns. You need to verify whether the Markup values include inaccurate data. What should you do? ()A、 Modify the content type of Markup as Continuous.B、 Create a data mining dimension in the SSAS database from OrderDetails.C、 Create a data profile by using SQL Server 2008 Integration Services (SSIS).D、 Create a cube in SSAS. Use OrderDetails as a measure group. Recreate the data mining structure and mining model from the cube data.

You administer a SQL Server 2008 instance. The instance hosts a database that is used by a Web-based application. The application processes 15,000 transactions every minute. A table in the database contains a column that is used only by the application. This column stores sensitive data. You need to store the sensitive data in the most secure manner possible. You also need to ensure that you minimize the usage of memory space and processor time. Which encryption type should you use?()A、Symmetric key encryptionB、Asymmetric key encryptionC、Certificate-based encryptionD、Transparent data encryption

Why is a data source required?()A、 Data source contains data required for impact event enrichment.B、 Data source contains data required for calculating server downtime.C、 Data source contains data required for services and other related service information.D、 Data source contains data required for LDAP configurations, including login attempts and errors.

单选题Examine the following scenario: The target database instance is running. The most recent backup available for the target database was taken two days ago. Log files switches have occurred in last two days. The target database is duplicated on the same host, using the Recovery Manager (RMAN) duplicate command as follows:   RMAN RUN { ALLOCATE AUXILIARY CHANNEL aux 1 DEVICE TYPE DISK;  DUPLICATE TARGET DATABASE TO auxdb; }   Which statement is true about the duplicate database in this scenario?()A It contains data till the last backupB It contains all data from target database until the current timeC It contains all data from only the committed transactions in the target databaseD It contains all data except that which is used by the transactions in the current online redo file of target database

单选题An International Oil Pollution Prevention Certificate (IOPP) for a "new" vessel ceases to be valid if ().Ait exceeds 3 years from date of issueBan alteration approved by the Captain of the Port is madeCan intermediate survey has not be conducted within 12 months from the date that the IOPP was issuedDthe vessel is transferred to the flag of another country

单选题The International Oil Pollution Prevention (IOPP) Certificate required by MARPOL is issued to CHINA flag ships by the().AInternational Maritime OrganizationBMSA OF CHINACCCSDEnvironmental Protection Agency

单选题You want to create a pie-style chart using the Chart Wizard. What must be you do to determine the fields available for use in this chart? ()ASelect the block that contains the data to appear in the pie chart. BSelect the table that contains the data to appear in the pie chart. CSelect the view that contains the data to appear in the pie chart. DNothing. The wizard will automatically create the pie chart based on the highlighted data.

单选题The supplement to the IOPP Certificate contains what type of data? ()AThe grades of cargo that an oil tanker is permitted to carryBA checklist of the equipment installed for controlling the discharge of oilCThe trade routes upon which the vessel may operateDA list of the underwriters who will assume financial responsibility in the event of an oil spill

单选题What is the data type returned by the CREATE_TIMER built-in?()AlongBtimerCnumberDvarchar2

单选题After an IOPP Certificate is issued to an inspected vessel,how many other surveys of the vessel’s pollution prevention equipment are conducted during the period of validity of the certificate?()ANoneBOneCTwoDThree

单选题You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application. The application has multiple data entry windows. Each window contains controls that allow the user to type different addresses for shipping and mailing. All addresses have the same format. You need to ensure that you can reuse the controls. What should you create?()Aa user controlBa data templateCa control templateDa control that inherits the Canvas class

单选题The IOPP certificate is valid for ()Aone yearBtwo yearsCfour yearsDfive years

单选题Why is a data source required?()A Data source contains data required for impact event enrichment.B Data source contains data required for calculating server downtime.C Data source contains data required for services and other related service information.D Data source contains data required for LDAP configurations, including login attempts and errors.

单选题Windows Communication Foundation (WCF) application uses a data contract that has several data members. You need the application to throw a Serialization Exception if any of the data members are not present when a serialized instance of the data contract is deserialized. What should you do?()A Add the Known Type attribute to the data contract.Set a default value in each of the data member declarations.B Add the Known Type attribute to the data contract.Set the Order property of each data member to unique integer value.C Set the Emit Default Value property of each data member to false.D Set the Is Required property of each data member to true.

单选题Using an LDAP authentication server, what do you configure to validate certificate attributes?()AUse the is exactly or contains operators.BCreate a user filter matching thedn of the certificate.CVerify that the certificate is issued by a publicly trusted cs.DMatch the certificate type and value with an attribute from theldap server.