单选题A batch application executes a large number of update statements. The service level agreement for the application states that the application must complete its work as quickly as possible to ensure that dependent workloads can start ontime. What is one way to help the application complete quickly?()ACode the application to issue a LOCK TABLE statement.  BCode the application to issue a LOCK ROW statement.  CDecrease the number of I/O servers.  DIncrease the locklist parameter.

单选题
A batch application executes a large number of update statements. The service level agreement for the application states that the application must complete its work as quickly as possible to ensure that dependent workloads can start ontime. What is one way to help the application complete quickly?()
A

Code the application to issue a LOCK TABLE statement.  

B

Code the application to issue a LOCK ROW statement.  

C

Decrease the number of I/O servers.  

D

Increase the locklist parameter. 


参考解析

解析: 暂无解析

相关考题:

You develop a Windows Communication Foundation (WCF) service. It is used exclusively as an intranet application and is currently unsecured. You need to ensure that the service meets the following requirements: The service now must be exposed as an Internet application. The service must be secured at the transport level. Impersonation and delegation cannot be enabled.What should you use? ()A. basicHttpBinding and HTTPB. basicHttpBinding and KerberosC. wsHttpBinding and KerberosD. wsHttpBinding and HTTPS

Certkiller.com has asked you to create an application to display all of the top directories based on the drive path.You need to ensure that the application displays the number of files within top-level directories.What should you do?()A.B.C.D.

You have recently completely creating a new application for Certkiller .com.This new application has to load an instance of the Inventory class from a large file named Inventory.dat.You need to ensure that the application executes the loading process in as little time as possible.What should you do?()A.B.C.D.

Your company has 1,000 client computers.  You are planning to deploy Windows 7 and a new line-of-business application.   You have the following requirements:   Install the application as part of the standard Windows 7 deployment. Use a single Windows 7 image for the deployment.  The application must be available for use on client computers that are not connected to the network.   You need to ensure that the application is installed on all new client computers.   What should you do?()A、Publish the application by using Group Policy Software Installation.B、Deploy the application by using Windows Server Update Services (WSUS).C、Service an online image of Windows 7 to add the new application.D、Service an offline image of Windows 7 to add the new application.

You have the following requirements:   - Ensure that the business tier can be updated without affecting the application tier.   - Use the minimum role instance size that meets or exceeds the current server specifications.    You need to recommend a topology for hosting the application in Windows Azure.  What should you recommend?()A、 Deploy the application tier and the business tier to one role with two Medium instances.B、 Deploy the application tier and the business tier to one role with two Large instances.C、 Deploy the application tier role to a Medium instance.  Deploy the business tier role to a medium instance.D、 Deploy the application tier role to a Large instance.  Deploy the business tier role to a Large instance.

Which of the following is TRUE for the DB2 isolation level Cursor Stability (CS)?()A、An application process acquires at least a share lock on the current row of every cursor.B、Any row that is read during a unit of work cannot be changed by other application processes until the unit of work is complete.C、Any row changed by another application process can be read, even if the change has not been committed by that application process.D、An application process that issues the same query more than once in a unit of work will not see additional rows caused by other application processes appending new information to the database.

Application A is designed to execute the following SQL statements within a single Unit of Work (UOW). UPDATE employee SET salary = salary * 1.1 WHERE empno='000010' UPDATE department SET deptname = 'NEW dept' WHERE deptno='A00'Application B is designed to execute the following SQL statements within a single Unit of Work (UOW). UPDATE department SET deptname = 'OLD DEPT' WHERE deptno='A00' UPDATE employee SET salary = salary * 0.5 WHERE empno='000010' Application A and application B execute their first SQL statement at the same time. When application A and application B try to execute their second SQL statement, a deadlock occurs. What will happen?() A、The database manager will rollback the transaction in both applications.B、The database manager will rollback the transaction in one of the two applications.C、Application B will successfully update the EMPLOYEE and DEPARTMENT tables; Application A will be placed in a lock wait state.D、Application A will successfully update the EMPLOYEE and DEPARTMENT tables; Application B will terminate when the lock timeout value is reached.

Application A holds an Update lock on a single row and application B is trying to read that row. If both applications are using isolation level UR, which of the following will occur?()A、Application B will read the row.B、Applications A and B will cause a deadlock situation.C、Application B will wait until application A releases the Update lock.D、Application A will be terminated so that application B can read the row.

A batch application executes a large number of update statements. The service level agreement for the application states that the application must complete its work as quickly as possible to ensure that dependent workloads can start ontime. What is one way to help the application complete quickly?()A、Code the application to issue a LOCK TABLE statement.  B、Code the application to issue a LOCK ROW statement.  C、Decrease the number of I/O servers.  D、Increase the locklist parameter.

To enhance the availability of an application running under HACMP, a decision was made to use  The application monitoring facility. The application consists of several components and can take several minutes to initialize. The components use socket communication and can be initialized in any order as long as it is a serial order. The customer’s concern is that if the application stop and start scripts are used during application monitoring recovery,it may take an extraordinary length of time to reset all of the application components.  What can be done to ensure the best recover time?()   A、 Use a process monitor that restarts the named processes in the original start order.B、 Use the defined application start and stop scripts to control the application if there is a failure.C、 Use multiple application monitors for this resource group to enable the monitoring of the specific components of the resource group.D、 Use application cleanup and restart scripts designed to determine the state of the various components of the application and start only the parts required.

A customer needs to ensure that the number of threads servicing an application does not exceed the number of database connections available to the application. What step must you take to address this situation?()A、Configure a Max Threads Constraint and add your application to the list of applications for the  Constraint.B、Configure a Work Manager with a Maximum Threads Constraint tied to the Connection Pool and  configuration your application to use the Work Manager.C、Configure a Work Manager with a Minimum Threads Constraint tied to the Connection Pool and  configure your application to use the Work Manager.D、Configure a global MaxThreads constraint and target it to the server or clusters where your  application is deployed.E、Configure the startup parameter "-Dwls-maxThreads" to be the same as the number of  database connections configured.

Your network consists of a single Active Directory domain. The network contains a server that runs Windows Server 2003 Service Pack 2 (SP2). The server has an application that runs as a service. The application uses a domain service account to access other servers in the domain. Security policies require that users reset their passwords every 30 days. After the application runs for a month, the application fails.You need to ensure that the application starts and can access the remote servers. What should you do?()A、In the Services snap-in, set the service to log on as the Local System account and start the service.B、In the Services snap-in, set the service to log on as the Local Administrator account and start the service.C、In Active Directory Users and Computers, reset the server’s computer account. In the Services snap-in, start the service.D、In Active Directory Users and Computers, set the Account Expires option to Never. In the Services snap-in, start the service.

You are creating a client application and configuring it to call a Windows Communication Foundation (WCF) service.When the application is deployed, it will be configured to send all messages to a WCF routing service. You need to ensure that the application can consume the target service after the application is deployed. What should you do?()A、In the client application, add a service reference to the router service. In the client binding configuration, specify the address of the router service.B、In the client application, add a service reference to the target service. In the client binding configuration, specify the address of the target service.C、In the client application, add a service reference to the router service. In the client binding configuration, specify the address of the target service.D、In the client application, add a service reference to the target service. In the client binding configuration, specify the address of the router service.

You develop a Windows Communication Foundation (WCF) service. It is used exclusively as an intranet application and is currently unsecured. You need to ensure that the service meets the following requirements: The service now must be exposed as an Internet application. The service must be secured at the transport level. Impersonation and delegation cannot be enabled. What should you use? ()A、basicHttpBinding and HTTPB、basicHttpBinding and KerberosC、wsHttpBinding and KerberosD、wsHttpBinding and HTTPS

A Windows Communication Foundation (WCF) service has a callback contract. You are developing a client application that will call this service.You must ensure that the client application can interact with the WCF service. What should you do?()A、On the OperationContractAttribute, set the AsyncPattern property value to true.B、On the OperationContractAttribute, set the ReplyAction property value to the endpoint address of the client.C、On the client, create a proxy derived from DuplexClientBaseTChannel .D、On the client, use GetCallbackChannelT .

单选题To enhance the availability of an application running under HACMP, a decision was made to use  The application monitoring facility. The application consists of several components and can take several minutes to initialize. The components use socket communication and can be initialized in any order as long as it is a serial order. The customer’s concern is that if the application stop and start scripts are used during application monitoring recovery,it may take an extraordinary length of time to reset all of the application components.  What can be done to ensure the best recover time?()A Use a process monitor that restarts the named processes in the original start order.B Use the defined application start and stop scripts to control the application if there is a failure.C Use multiple application monitors for this resource group to enable the monitoring of the specific components of the resource group.D Use application cleanup and restart scripts designed to determine the state of the various components of the application and start only the parts required.

单选题You work as an application developer at Certkiller .com. You are currently in the process of developing a business logic component that requires long calculations. You have identified numerous tasks within this application that can be done asynchronously. You notice that these tasks are mutually dependent and require complex synchronization techniques so that it can manage efficiently. You decide to use Microsoft .NET 2.0 to take advantage of its new thread management features. You need to create and start the application threads. What should you do?()A AB BC CD D

单选题Your network consists of a single Active Directory domain. The network contains a server that runs Windows Server 2003 Service Pack 2 (SP2). The server has an application that runs as a service. The application uses a domain service account to access other servers in the domain. Security policies require that users reset their passwords every 30 days. After the application runs for a month, the application fails. You need to ensure that the application starts and can access the remote servers.  What should you do?()AIn the Services snap-in, set the service to log on as the Local System account and start the service.BIn the Services snap-in, set the service to log on as the Local Administrator account and start the service.CIn Active Directory Users and Computers, reset the servers computer account. In the Services snap-in, start the service.DIn Active Directory Users and Computers, set the Account Expires option to Never. In the Services snap-in, start the service.

单选题You work as the application developer at Certkiller .com. Certkiller .com uses Visual Studio.NET 2005 as its application development platform. You are developing a Windows Service application which contains three different Windows services. You are required to only set one Windows service to start automatically when the system is restarted. What should you do?()AUse the ServiceController class.BUse the ServiceBase class.CUse the ServiceProcessInstaller class.DUse the ServiceInstaller class.

单选题A Windows Communication Foundation (WCF) service has a callback contract. You are developing a client application that will call this service.You must ensure that the client application can interact with the WCF service. What should you do?()AOn the OperationContractAttribute, set the AsyncPattern property value to true.BOn the OperationContractAttribute, set the ReplyAction property value to the endpoint address of the client.COn the client, create a proxy derived from DuplexClientBaseTChannel .DOn the client, use GetCallbackChannelT .

单选题You are creating a client application and configuring it to call a Windows Communication Foundation (WCF) service.When the application is deployed, it will be configured to send all messages to a WCF routing service. You need to ensure that the application can consume the target service after the application is deployed. What should you do?()AIn the client application, add a service reference to the router service. In the client binding configuration, specify the address of the router service.BIn the client application, add a service reference to the target service. In the client binding configuration, specify the address of the target service.CIn the client application, add a service reference to the router service. In the client binding configuration, specify the address of the target service.DIn the client application, add a service reference to the target service. In the client binding configuration, specify the address of the router service.

单选题You have the following requirements:   - Ensure that the business tier can be updated without affecting the application tier.   - Use the minimum role instance size that meets or exceeds the current server specifications.    You need to recommend a topology for hosting the application in Windows Azure.  What should you recommend?()A Deploy the application tier and the business tier to one role with two Medium instances.B Deploy the application tier and the business tier to one role with two Large instances.C Deploy the application tier role to a Medium instance.  Deploy the business tier role to a medium instance.D Deploy the application tier role to a Large instance.  Deploy the business tier role to a Large instance.

单选题A customer needs to ensure that the number of threads servicing an application does not exceed the number of database connections available to the application. What step must you take to address this situation?()AConfigure a Max Threads Constraint and add your application to the list of applications for the  Constraint.BConfigure a Work Manager with a Maximum Threads Constraint tied to the Connection Pool and  configuration your application to use the Work Manager.CConfigure a Work Manager with a Minimum Threads Constraint tied to the Connection Pool and  configure your application to use the Work Manager.DConfigure a global MaxThreads constraint and target it to the server or clusters where your  application is deployed.EConfigure the startup parameter -Dwls-maxThreads to be the same as the number of  database connections configured.

单选题You work as an application developer at Certkiller .com. You have created a Windows service application for the purpose of monitoring the number of active service requests running on Certkiller .com’s server.  You want to configure this Windows service application to produce a report every ten minutes. You start by placing the reporting logic in the GenerateReport method of this Windows service.You want to create a Timer object that invokes this method every ten minutes.What should you do? ()A AB BC CD D

单选题A batch application executes a large number of update statements. The service level agreement for the application states that the application must complete its work as quickly as possible to ensure that dependent workloads can start ontime. What is one way to help the application complete quickly?()ACode the application to issue a LOCK TABLE statement.  BCode the application to issue a LOCK ROW statement.  CDecrease the number of I/O servers.  DIncrease the locklist parameter.

单选题You develop a Windows Communication Foundation (WCF) service. It is used exclusively as an intranet application and is currently unsecured. You need to ensure that the service meets the following requirements: The service now must be exposed as an Internet application. The service must be secured at the transport level. Impersonation and delegation cannot be enabled. What should you use? ()AbasicHttpBinding and HTTPBbasicHttpBinding and KerberosCwsHttpBinding and KerberosDwsHttpBinding and HTTPS

单选题Application A is designed to execute the following SQL statements within a single Unit of Work (UOW). UPDATE employee SET salary = salary * 1.1 WHERE empno='000010' UPDATE department SET deptname = 'NEW dept' WHERE deptno='A00'Application B is designed to execute the following SQL statements within a single Unit of Work (UOW). UPDATE department SET deptname = 'OLD DEPT' WHERE deptno='A00' UPDATE employee SET salary = salary * 0.5 WHERE empno='000010' Application A and application B execute their first SQL statement at the same time. When application A and application B try to execute their second SQL statement, a deadlock occurs. What will happen?()AThe database manager will rollback the transaction in both applications.BThe database manager will rollback the transaction in one of the two applications.CApplication B will successfully update the EMPLOYEE and DEPARTMENT tables; Application A will be placed in a lock wait state.DApplication A will successfully update the EMPLOYEE and DEPARTMENT tables; Application B will terminate when the lock timeout value is reached.

单选题Which of the following is TRUE for the DB2 isolation level Cursor Stability (CS)?()AAn application process acquires at least a share lock on the current row of every cursor.BAny row that is read during a unit of work cannot be changed by other application processes until the unit of work is complete.CAny row changed by another application process can be read, even if the change has not been committed by that application process.DAn application process that issues the same query more than once in a unit of work will not see additional rows caused by other application processes appending new information to the database.