单选题Data transfer is slow between the source and destination. The quality of service requested by the transport layer in the OSI reference model is not being maintained. To fix this issue, at which layer should the troubleshooting process begin?()ApresentationBsessionCtransportDnetworkEphysical
单选题
Data transfer is slow between the source and destination. The quality of service requested by the transport layer in the OSI reference model is not being maintained. To fix this issue, at which layer should the troubleshooting process begin?()
A
presentation
B
session
C
transport
D
network
E
physical
参考解析
解析:
暂无解析
相关考题:
You are the administrator of several SQL Server 2000 computers. A data Transformation Services (DTS) package uses native OLE DB providers to transfer data between the servers. Connection details for the servers are specified in .udl files. The .udl files are frequently updated as connection details change.You want to distribute the DTS package as a file to developers in your company. You want to make sure connection details are available to developers who receive the DTS package.Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two)A.Enable the Always read properties from UDL file option in the Connection Properties dialog box.B.Disable the Always read properties from UDL file option in the Connection Properties dialog box.C.Delete the .udl files and store connection details in the registry by using system data source names.D.Delete the .udl files, and store connection details in the registry by using user data source names.E.Make the .udl files available on a network share.
In low-speed network,it is usually adequate to wait for congestion to occur and then react to it bytelling the source of packets to slow down.In high-speed networks,this approach often works poorly,because in the(71) between sending the notification and notification arriving at the source,thousands of additional(72) may arrive.In ATM network,a major tool for preventing(73)is(74)control.When a host wants a new virtual(75),it must describe the traffic to be offeredand the service expected.(69)A.intervalB.timeC.slotD.delay
In the open systems interconnection (OSI) reference model, "layer" means one of seven conceptually complete,(71) arranged groups of services, functions, and protocols, that extend across all open systems.Application layer provides means for the application(72) to access the OSI environment. Presentation layer provides for the selection of a common syntax for representing data.(73) layer provides the means necessary for cooperating presentation entities to organize and synchronize their dialog and to manage their data exchange. Transport layer provides a reliable end-to-end data transfer service. Network layer provides for the entities in the transport layer the means for transferring blocks of data, by(74) and switching through the network between the open systems in which those entities reside. Data link layer provides services to transfer data between network layer entities. Physical layer provides the mechanical, electrical, functional, and procedural means to establish, maintain and(75) physical connections for transfer of bits over a transmission medium.A.ranklyB.levellyC.layeredD.hierarchically
USER_DATA is a nonencrypted tablespace that contains a set of tables with data. You want to convert all existing data in the USER_DATA tablespace and the new data into the encrypted format.Which methodswould you use to achieve this?()A. Use Data Pump to transfer the existing data to a new encrypted tablespaceB. Use ALTER TABLE MOVE to transfer the existing data to a new encrypted tablespaceC. Use CREATE TABLE AS SELECT to transfer the existing data to a new encrypted tablespaceD. Enable row movement for each table to be encrypted and then use ALTER TABLESPACE to encrypt the tablespaceE. Encrypt the USER_DATA tablespace using the ALTER TABLESPACE statement so that all the data in the tablespace is automatically encrypted
A general purpose MySQL instance is configured with the following options:—log-slow-queries—long-query-time=,0001—log-slow-admin-queries—general-log—log-bin—binlog-format=STATEMENT—innodb-flush-log-at-trx-commit=1Which three statements are true()。A.The General Query Log records more data than the Binary LogB.The binary Log records more data than the General Query LogC.The Slow Query Log records more data than the General Query LogD.The General Query Log records more data than the Slow Query LogE.The Slow Query Log records more data than the Binary LogF.The Binary Log records more data than the Slow Query Log
The "main storage" normally means that part of internal storage into which instructions and other data must be loaded for subsequent execution or processing. In large computing systems, the term "main storage" is(71) to "memory". "Buffer" mainly indicates a special-purpose storage or storage area allowing, through(72) storage, the data transfer between two functional units having different transfer characteristics. A buffer storage is used between non-synchronized devices or where one is(73) and the other is parallel or between those having different trans far rates. "(74) (memory)" is also a special-purpose buffer storage, smaller and faster than main storage, used to hold a copy of instructions and data obtained from main storage and likely to be needed next by the processor. "Register" is commonly composed of a part of internal storage having a specified storage(75) and usually intended for a specific purpose.A.suitableB.optionalC.choiceD.preferred
is the 4th layer of the OSI reference model responsible for reliable network communication between end nodes.A.Data link layerB.Session layerC.Transport layerD.Application layer
In low - speed network ,it is usually adequate to wait for congestion to occur and then react to it by telling the source of packets to slow down. In high - speed networks, this approach often works poorly, because in the(71)between sending the notification and notification arriving at the source, thousands of additional(72)may arrive. In ATM network , a major tool for preventing(73)is(74)control. When a host wants a new virtual(75),it must describe the traffic to be offered and the service expected.A.intervalB.timeC.slotD.delay
You are the administrator of a SQL Server 2000 computer. The server contains a database that stores financial data. You want to use Data Transformation Services packages to import numeric data from other SQL server computers. The precision and scale values of this data are not defined consistently on the other servers.You want to prevent any loss of data during the import operations. What should you do?A.Use the ALTER COLUMN clause of the ALTER TABLE statement to change data types in the source tables. Change the data types so that they will use the lowest precision and scale values of the data that will be transferred.B.Use the ALTER COLUMN clause of the ALTER TABLE statement to change data types in the destination tables. Change the data types to reflect the highest precision and scale values involved in data transfer.C.Set a flag on each DTS transformation to require an exact match between source and destination columns.D.Set the maximum error count for each DTS transformation task equal to the number of rows of data you are importing. Use an exception file to store any rows of data that generate errors.E.Write Microsoft ActiveX script. for each DTS transformation. Use the script. to recast data types to the destinations precision and scale values.
Data transfer is slow between the source and destination. The quality of service requested by the transport layer in the OSI reference model is not being maintained. To fix this issue, at which layer should the troubleshooting process begin?()A. presentationB. sessionC. transportD. networkE. physical
When exporting metadata for the transportable tablespaces, what is the correct next step after confirming endian format?()A、 Export the tablespaces using data pump.B、 Determine if the transportable set is self-contained.C、 Convert the datafiles using RMAN.D、 Copy the datafiles from source to destination.
Data transfer is slow between the source and destination. The quality of service requested by the transport layer in the OSI reference model is not being maintaineD.To fix this issue, at which layer should the troubleshooting process begin?()A、presentationB、sessionC、transportD、networkE、physical
Which of the following is the definition of CAS latency?()A、 CAS latency is the ratio between the column access time and the clock cycle time.B、 CAS latency is the ratio between the row access time and the clock cycle time.C、 CAS latency is the ratio between the column access time and the data burst transfer time.D、 CAS latency is the ratio between the row access time and the data burst transfer time.
Why is a data source required?()A、 Data source contains data required for impact event enrichment.B、 Data source contains data required for calculating server downtime.C、 Data source contains data required for services and other related service information.D、 Data source contains data required for LDAP configurations, including login attempts and errors.
单选题You are creating the DEPT_SAL data block from the PAYHIST form. Users should be able to enter a valid department ID number, which will then display the employee salary information for that department. This data block could potentially retrieve a large number of records. Since users will probably only view a small number of these records, only 10 records should be fetched at one time. How would you create the data block?()ASelect The Data Blocks node in the Object Navigator and click the Create button. Choose to build the data block manually, enter the procedure name in the Query Data Source Columns property, and the procedure code in the Query Data Source Arguments property. BChoose Tools - Data Block Wizard, select Table as the data source type, and base the block on the columns from the tables. CChoose Tools - Data Block Wizard, select, View as the data source type, and base the block on the columns from the tables. DSelect the Data Blocks node in the Object Navigator and click the Create button. Choose to build the data block manually, alter the Query Data Source Type property to 'FROM clause query', and enter the SELECT statement in the Query Data Source Name property. ESelect the Data Block node in the Object Navigator and click the Create button. Alter the Query Data Source Type, Query Data Source Name, Query Data Sources Columns, and Query Data Source Arguments properties to create a stored procedure that uses a red cursor.
单选题The accounting manager wants you to create a form that when queried will display a calculated total of year-to-date actual expenditures for the fund code entered. The value needed to generate this summary data are stored in multiple tables. How would you define the data source for this data block without having the DBA create a database object? ()AChoose Tools - Data Block Wizard, select View as the data source type, and base the block on the columns from the bales. BChoose Tools - Data Block Wizard, select Table as the data source type, and base the block on the columns from the tables. CSelect the Data Blocks node in the Object Navigator and click the Create button. Choose to build the data block manually and alter the Query Data Source Columns and Query Data Source Arguments properties to enter the SELECT statement. DSelect the Data Blocks node in the Object Navigator and click the Create button. Choose to build the data block manually, alter the Query Data Source Type property to 'Table', and enter the SELECT statement in the Query Data Source Name property. EChoose Tools - Data Block Wizard, select Stored Procedure as the data source type, and base the block on the columns the tables. FSelect the Data Blocks node in the Object Navigator and click the Create button. Choose to build the data block manually. Alter the Query Data Source Type to 'FROM' clause query', and enter the SELECT statement in the Query Data Source Name property.
多选题A general purpose MySQL instance is configured with the following options: —log-slow-queries —long-query-time=,0001 —log-slow-admin-queries —general-log —log-bin —binlog-format=STATEMENT —innodb-flush-log-at-trx-commit=1 Which three statements are true()。AThe General Query Log records more data than the Binary LogBThe binary Log records more data than the General Query LogCThe Slow Query Log records more data than the General Query LogDThe General Query Log records more data than the Slow Query LogEThe Slow Query Log records more data than the Binary LogFThe Binary Log records more data than the Slow Query Log
单选题Which of the following statements is correct concerning heat transfer?()AHeat is given off from a high temperature region known as a heat sinkBHeat transfer rate is affected most by the size of the heat sink involvedCHeat transfer rate is affected most by the temperature difference between the heat source and the heat sinkDHeat transfer by radiation will occur only by mass motion of a fluid substance
单选题What is the architectural benefit of keeping WebLogic Server transaction log in the database?()AOracle does not allow replicating files between data centers, so keeping transaction log in database allows for replication.BMany transactions in WebLogic are database centric, so keeping log in database makes Two Phase Commit protocol possible.CIt obviates the need to keep in sync two replication technologies (file and database) between data centers. The single replication technology is used for frequently changing data.DTransaction log in a file system is extremely slow so it cannot be efficiently replicated.
单选题Which of the following is the definition of CAS latency?()A CAS latency is the ratio between the column access time and the clock cycle time.B CAS latency is the ratio between the row access time and the clock cycle time.C CAS latency is the ratio between the column access time and the data burst transfer time.D CAS latency is the ratio between the row access time and the data burst transfer time.
单选题You are creating the SAL_INFO data block on the EMP_QUERY form. The SALARY field should only be populated if the logged-on user is a manager. Since this query could potentially return a large amount of records, you have created a stored procedure which uses a ref cursor on which to base the data block. How would you create the data block?()AClick the Data Blocks node in the Object Navigator and click the create button. Choose to build the data block manually. Enter the procedure name in the Query Data Source Columns property and the procedure code in the Query Data Source Arguments property. BChoose Tools - Data Block Wizard, select Table as the data source type, and base the data block on the columns included in the procedure. CSelect the Data Blocks node in the Object Navigator and click the Create button. Choose to build the data block manually, alter the Query Data Source Type property to 'Ref cursor', and enter the name of the procedure in the Query Data Source Name property. DSelect the Data Blocks node in the Object Navigator and click the Create button. Alter the Query Data Source Name, Query Data Source Columns, and Query Data Source Arguments properties to create a stored procedure that uses a ref cursor. ELaunch the Data Block Wizard, select Stored Procedures as the data source type, and base the block on the procedure.
单选题Why is a data source required?()A Data source contains data required for impact event enrichment.B Data source contains data required for calculating server downtime.C Data source contains data required for services and other related service information.D Data source contains data required for LDAP configurations, including login attempts and errors.
单选题When exporting metadata for the transportable tablespaces, what is the correct next step after confirming endian format?()A Export the tablespaces using data pump.B Determine if the transportable set is self-contained.C Convert the datafiles using RMAN.D Copy the datafiles from source to destination.
单选题You design a Business Intelligence (BI) solution by using SQL Server 2008. You create a SQL Server 2008 Reporting Services (SSRS) solution by using SQL Server 2008. Several reports on the server use a shared data source named DSProduction. You modify an existing report that uses the DSProduction data source. After deployment, the modified report must use an alternate data source. You need to prevent the modified report from affecting other reports. What should you do?()A Update the connection string of the DSProduction shared data source to point to the alternate data source.B Update the modified report to use a report-specific data source. Update the connection string of the report-specific data source to point to the alternate data source.C Create a new shared data source named DSProduction in the same folder as that of the modified report. Update the connection string of the new shared data source to point to the alternate data source.D Disable the DSProduction data source. Update the modified report to use a report-specific data source. Update the connection string of the report-specific data source to point to the alternate data source.
单选题How can you configure High Availability for interacting with a non-Oracle database using WebLogic?()AConfigure multiple physical data sources and reuse the same JNDI name for each.BUse the compatibility option of Active GridLink to enable compatibility with non-Oracle databases.CConfigure a single physical data source for each node in a database cluster and wrap it using Multi Data Source.DConfigure a Data Source Group that contains a physical connection pool to each node in the database cluster.
多选题USER_DATA is a nonencrypted tablespace that contains a set of tables with data. You want to convert all existing data in the USER_DATA tablespace and the new data into the encrypted format. Which methodswould you use to achieve this?()AUse Data Pump to transfer the existing data to a new encrypted tablespaceBUse ALTER TABLE MOVE to transfer the existing data to a new encrypted tablespaceCUse CREATE TABLE AS SELECT to transfer the existing data to a new encrypted tablespaceDEnable row movement for each table to be encrypted and then use ALTER TABLESPACE to encrypt the tablespaceEEncrypt the USER_DATA tablespace using the ALTER TABLESPACE statement so that all the data in the tablespace is automatically encrypted
单选题You design a Business Intelligence (BI) solution by using SQL Server 2008. You design a SQL Server 2008 Analysis Services (SSAS) solution. Customer data is stored in the tables named CustomerDetails and CustomerContact. The solution uses the following two data sources from two different servers: ·Contoso that accesses the CustomerDetails table ·ContosoCRM that accesses the CustomerContact table You plan to create a dimension named DimCustomer to analyze customer data. You need to ensure that the DimCustomer dimension represents the tables as a snowflake schema to include attributes from the two tables. What should you do?()A Create a data source view named DsvContoso that is associated with the two data sources and add the tables to the data source view.B Create a data source view named DsvContoso that is associated with the two data sources and create a named query in the data source view to merge the tables.C Create a data source view named DsvCustomer that is associated with the Contoso data source and add the CustomerDetails table to the data source view.Create a data source view named DsvCustomerContact that is associated with the ContosoCRM data source and add the CustomerContact table to the data source view.D Create a data source view named DsvCustomer that is associated with the Contoso data source and create a named query in the data source view to select data from the CustomerDetails table.Create a data source view named DsvCustomerContact that is associated with the ContosoCRM data source and create a named query in the data source view to select data from the CustomerContact table.