单选题You need to cleanse and standardize the data on potential survey participants prior to inserting it into the staging database. What should you do?()AImport the data into a staging table by using the OPENROWSET BULK statement. Execute a Transact-SQL stored procedure to cleanse the data and to insert the data into the database.BImport the data into a staging table by using the BULK INSERT statement. Execute a Transact-SQL stored procedure to cleanse the data and to insert the data into the database.CCreate a SQL Server Integration Services (SSIS) package to import, standardize, and cleanse the data.DCreate a CLR stored procedure to import the data into a staging table, to cleanse and standardize the data, and to insert the data into the database.
单选题
You need to cleanse and standardize the data on potential survey participants prior to inserting it into the staging database. What should you do?()
A
Import the data into a staging table by using the OPENROWSET BULK statement. Execute a Transact-SQL stored procedure to cleanse the data and to insert the data into the database.
B
Import the data into a staging table by using the BULK INSERT statement. Execute a Transact-SQL stored procedure to cleanse the data and to insert the data into the database.
C
Create a SQL Server Integration Services (SSIS) package to import, standardize, and cleanse the data.
D
Create a CLR stored procedure to import the data into a staging table, to cleanse and standardize the data, and to insert the data into the database.
参考解析
解析:
暂无解析
相关考题:
你们需要安保专家对场馆做安全评估吗?A.Do you need a security expert to value the potential danger of the region?B.Do you need a security expert to calculate the potential adventure of the area?C.Do you need a security expert to account the potential risks of the region?D.Do you need a security expert to evaluate the potential risks of the place?
Certkiller.com has given you the task of serializing an object and writing it to a data file using binary serialization.You need to ensure that you meet these requirements.What should you do?() A.B.C.D.
You need to serialize an object of type Listint in a binary format.The object is named data.Which code segment should you use?() A.B.C.D.
Exhibit: You are developing a Web application. The Web application uses a GridView control to display data. You build your Web Forms for the Web application by dragging and dropping tables from the Data Connections tree in Server Explorer. You need to add a connection to your data by using the Add Connection dialog box as shown in the exhibit. During the process, you need to configure the .NET Data Provider that you use to create the data source objects. What should you do?()A. Right-click the connection, and click Properties. Modify the Provider property of the data connection.B. Click the Change button, and change the data provider for the selected data source.C. Click the Advanced button, and change the Data Source property to the target provider.D. Click the Advanced button, and change the Application Name property to the target provider.
You delete content from a file named Speed.doc that is stored in the C:\Data folder. You edit 20 files in this folder over the next two days. You need to restore the version of the file that had the correct data. You also need to ensure that the other fiels in the folder remain unaffected.What should you do?()A.AB.BC.CD.D
You need to ensure that you can recover system configuration and data if your computer hard disk fails.What should you do?() A.AB.BC.CD.D
You need to back up the existing data on a computer before you install a new application. You also need to ensure that you are able to recover individual user files that are replaced or deleted during the installation.What should you do?()A.AB.BC.CD.D
You install a custom application on a computer that runs Microsoft Windows XP. The application stores each user’s data in the %programfiles%\app1\data folder on the computer. You install the custom application on a computer that runs Windows Vista.On the Windows Vista computer, you back up the %programfiles%\app1\data folder and notice that the backup contains no data.You need to back up the application’s user data on the Windows Vista computer.What should you do?()A.AB.BC.CD.D
You are currently in the process of creating an application that reads binary information from a file.You need to ensure that the only the first kilobyte of data is retrieved.What should you do?() A.B.C.D.
A data file became corrupted in your database due to bad sectors on the disk. Because of corruption, you lost all the important tables in that data file. Which method would you use for recovery?()A、flash back all the tables in the data file, one by oneB、restore the data file to a new location and perform a media recoveryC、flash back the database; there is no need to restore the data fileD、restore the data file from the most recent backup and flash back the database
You are using Oracle Database 10g. Which statement regarding an incomplete recovery is true?()A、 You do not need to restore all the data files.B、 You do not need to open the database with the RESETLOGS operationC、 You do not need to perform a full backup after the RESETLOGS operation.D、 You do not need to recover all the data files to the same system change number (SCN).
You are designing a Windows Azure application that will store data. You have the following requirements: - The data storage system must support the storage of more than 500 GB of data. - Data retrieval must be possible from a large number of parallel threads without threads blocking each other. You need to recommend an approach for storing data. What should you recommend?()A、 Use Windows Azure Queues.B、 Use Windows Live Mesh 2011.C、 Use a single SQL Azure database.D、 Use Windows Azure Table storage
You have a Web application that is configured for personalization. You need to access personalization data from one of the pages of the Web application by using the minimum amount of administrative effort. What should you do? ()A、Access the personalization data from the Session property of the HttpContext object.B、Access the personalization data from the Application property of the HttpContext object.C、Access the personalization data from the Cache property of the HttpContext object.D、Access the personalization data from the Profile property of the HttpContext object.
You create a Data Collector Set (DCS).You need prevent the DCS from logging data if the server has less than 1 GB of available disk space. What should you do?()A、Create a passive file screen.B、Create an active file screen.C、Modify the Data Manager settings of the DCS.D、Modify the Stop Conditions settings of the DCS.
You need to cleanse and standardize the data on potential survey participants prior to inserting it into the staging database. What should you do?()A、Import the data into a staging table by using the OPENROWSET BULK statement. Execute a Transact-SQL stored procedure to cleanse the data and to insert the data into the database.B、Import the data into a staging table by using the BULK INSERT statement. Execute a Transact-SQL stored procedure to cleanse the data and to insert the data into the database.C、Create a SQL Server Integration Services (SSIS) package to import, standardize, and cleanse the data.D、Create a CLR stored procedure to import the data into a staging table, to cleanse and standardize the data, and to insert the data into the database.
You are creating an undo buffer that stores data modifications.You need to ensure that the undo functionality undoes the most recent data modifications first.You also need to ensure that the undo buffer permits the storage of strings only.Which code segment should you use?()A、Stackstring undoBuffer=new Stackstring();B、Stack undoBuffer=new Stack();C、Queuestring undoBuffer=new Queuestring();D、Queue undoBuffer=new Queue();
You use Microsoft Visual Studio 2010 and Microsoft . NET Framework 4 to create a Windows Presentation Foundation (WPF) application. You create a WPF window in the application. You add the following code segment to the application. public class ViewModel { public CollectionView Data { get; set; } } public class BusinessObject { public string Name { get; set; } } The DataContext property of the window is set to an instance of the ViewModel class. The Data property of the ViewModel instance is initialized with a collection of BusinessObject objects. You add a TextBox control to the Window. You need to bind the Text property of the TextBox control to the Name property of the current item of the CollectionView of the DataContext object. You also need to ensure that when a binding error occurs, the Text property of the TextBox control is set to N/A . Which binding expression should you use?()A、{ Binding Path=Data/Name, FallbackValue='N/A' }B、{ Binding Path=Data.Name, FallbackValue='N/A' }C、{ Binding Path=Data/Name, TargetNullValue='N/A' }D、{ Binding Path=Data.Name, TargetNullValue='N/A' }
You are a network administrator for your company. All servers run Windows Server 2003. You manage a server that functions as a file server. The data volume on the server is mirrored. Each physical disk is on a separate controller. One of the hard disks that contains the data volume fails. You discover that the failure was caused by a faulty SCSI controller. You replace the SCSI controller. You need to restore the data volume to its previous state. You need to achieve this goal by using the minimum amount of administrative effort. What should you do?()A、Run the diskpart active command to activate the failed volume.B、Convert both disks to basic disks, and then restore the data.C、Break the mirror, and then re-create the mirror.D、Select a disk in the mirror, and then reactivate the volume.
You need to recommend a monitoring solution for the new printer. What should you include in the recommendation?()A、Data Collector Sets (DCSs)B、event subscriptionsC、object access auditingD、Print Management filters
单选题You are developing a data contract for a Windows Communication Foundation (WCF) service. The data in the data contract must participate in round trips. Strict schema validity is not required. You need to ensure that the contract is forward-compatible and allows new data members to be added to it. Which interface should you implement in the data contract class?()AICommunicationObjectBIExtensionCIExtensibleObjectDIExtensibleDataObject
单选题You need to create a data block for DML operations in the NEW_EMPLOYEE form module. Which data source can you use for this block?()AREF cursor query. BStored function. CFrom clause query. DTransactional trigger.
单选题You need to ensure that old data and current data can be queried according to the business requirements. What should you do?()ASpecify a view based on the archival data table and current data tables.BSpecify that the data must be queried by using a stored procedure.CSpecify that both the archival data table and the current data tables must have indexes created on the same columns.DSpecify that a SQL Server Agent job must be used to copy current data into the archival data table each night.
单选题You need to base a data block on the EMP table, but you do not want to give the users of the application access privileges on the table. Which type of data source would you use to create the data block?()Atable Btransactional trigger Cstored procedure DFROM clause query
单选题You are using Oracle Database 10g. Which statement regarding an incomplete recovery is true?()A You do not need to restore all the data files.B You do not need to open the database with the RESETLOGS operationC You do not need to perform a full backup after the RESETLOGS operation.D You do not need to recover all the data files to the same system change number (SCN).
多选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows 2003 Server, and all client computers run Windows XP Professional. A file server named TK1 has two hard drives. You format D:/ and use the default file permissions. Then you copy a directory named Data from another file server to D:/ on TK1. Now you need to create a network share and configure NTFS permissions settings for D:/Data. You must fulfil the following requirements: 1. All domain users need read access to D:/Data. 2. Members of the Sales group need the ability to add and delete files in a directory named D:/Data/Sales. 3. Members of the Engineering group need the ability to read and modify files in a directory named D:/Data/Enginering. Which three actions should you perform?() (Each correct answer presents part of the solution. Choose three)AAssign the Allow - Modify NTFS permission on D:/Data/Sales to the Sales group.BAssign the Allow - Write NTFS permission on D:/Data/Engineering to the Engineering group.CShare D:/Data as Data and use the default share permissions.DShare D:/Data as Data and assign the Allow - Change share permission to the Everyone group.EAssign the Allow - Full Control NTFS permission on D:/Data to the Administrators group.FChange the share permission on D:/Data to assign the Allow - Modify permission to the Everyone group.GAssign the Allow - Read NTFS permission on D:/Data to the Users group.HAssign the Allow - Write NTFS permission on D:/Data/Sales and D:/Data/Engineering to the Creator Owner group.
单选题What does the Metadata Application Programming Interface (API) allow you to do?()ARepair damaged data dictionary entries.BDelete data dictionary information about database objects you no longer need.CExtract data definition commands from the data dictionary in a variety of formats.DPrepare pseudocode modules for conversion to Java or PL/SQL programs with a Metadata code generator
单选题You administer a SQL Server 2008 instance. The instance hosts a database that is used by a Web-based application. The application processes 15,000 transactions every minute. A table in the database contains a column that is used only by the application. This column stores sensitive data. You need to store the sensitive data in the most secure manner possible. You also need to ensure that you minimize the usage of memory space and processor time. Which encryption type should you use?()ASymmetric key encryptionBAsymmetric key encryptionCCertificate-based encryptionDTransparent data encryption