网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Your data recovery strategy must meet the following requirements: Back up all data files and folders in C:///Data.  Restore individual files and folders in C:///Data.  Ensure that data is backed up to and restored from external media.  What should you do?()

  • A、Use the Previous Versions feature to restore the files and folders.
  • B、Use the System Restore feature to perform backup and restore operations.
  • C、Use the NTBackup utility to back up and restore individual files and folders.
  • D、Use the Backup and Restore Center to back up and restore files.

参考答案

更多 “ Your data recovery strategy must meet the following requirements: Back up all data files and folders in C:///Data.  Restore individual files and folders in C:///Data.  Ensure that data is backed up to and restored from external media.  What should you do?()A、Use the Previous Versions feature to restore the files and folders.B、Use the System Restore feature to perform backup and restore operations.C、Use the NTBackup utility to back up and restore individual files and folders.D、Use the Backup and Restore Center to back up and restore files.” 相关考题
考题 Exhibit: You are developing a Web application. The Web application uses a GridView control to display data. You build your Web Forms for the Web application by dragging and dropping tables from the Data Connections tree in Server Explorer. You need to add a connection to your data by using the Add Connection dialog box as shown in the exhibit. During the process, you need to configure the .NET Data Provider that you use to create the data source objects. What should you do?()A. Right-click the connection, and click Properties. Modify the Provider property of the data connection.B. Click the Change button, and change the data provider for the selected data source.C. Click the Advanced button, and change the Data Source property to the target provider.D. Click the Advanced button, and change the Application Name property to the target provider.

考题 下列程序的运行结果是【 】。 include class SomeClass { public: SomeClass(int va 下列程序的运行结果是【 】。include <iostream. h>class SomeClass{public:SomeClass(int value) { some_value=value;};void show_data(void) { cout<<data<<"<<~some_value<<endl; };static void set_data(int value) {data=value; }private:static int data;int some_value};int SomeClass::datavoid main(void){SomeClass my_class(1001),your_class(2002);your_class. set_data(4004);my_elass. show_data()}

考题 Personal firewall is a technology that helps(66)intruders from accessing data on your PC via the Internet or another network, by keeping(67)data from entering or exiting your system.Hackers do not just target national security organizations for(68): They want your tax returns, network passwords, or bank account numbers. And you do not want the FBI kicking in your door because someone hijacked your PC to(69)in the latest denial-of-service attack on the Internet. Now that "always-on" broadband connections such as cable modems and digital subscriber line are becoming more popular, home users are at risk. Fortunately, you can protect your data. Firewalls can block(70)attacks and protect your PC from outside threats.A.allowB.preventC.inviteD.get

考题 Your company network has 500 client computers that run Windows 7. Your team consists of 20 desktop support technicians. Two technicians troubleshoot a hardware-related performance issue on a computer. The technicians obtain different results by using their own User Defined Data Collector Sets. You need to create a standardized Data Collector Set on a network share that is accessible to your team. What should you create?()A.Event Trace Data Collector SetB.Performance Counter Data Collector SetC.Performance Counter Alert Data Collector SetD.System Configuration Information Data Collector Set

考题 Your mobile device runs the latest version of the Microsoft Windows Mobile operating system.Your mobile device supports the use of Bluetooth and Infrared (IR) for data synchronization. You need to configure data synchronization on your computer to only use Bluetooth.Which three actions should you perform?()A.AB.BC.CD.DE.EF.F

考题 Your data recovery strategy must meet the following requirements:·Back up all data files and folders in C:\Data.·Restore individual files and folders in C:\Data.·Ensure that data is backed up to and restored from external media.What should you do?()A.AB.BC.CD.D

考题 You are the network administrator of an enterprise with a main site and multiple remote sites. Your networkcarries both VOIP and data traffic. You agree with your service provider to classify VOIP and data trafficaccording to the different service RFCs. How can your data and VOIP traffic be marked?()A、data marked with DSCP AF21,VOIP marked with DSCP EFB、data marked with DSCP AF51,VOIP marked with DSCP EFC、data marked with the DE-bit. VOIP marked with the CLP-bitD、data marked with DSCP EF,VOIP marked with DSCP AF31E、data marked with IP precedence 5,VOIP marked with DSCP EF

考题 You are the network administrator of an enterprise with a main site and multiple remote sites. Your network carries both VOIP and data traffic. You agree with your service provider to classify VOIP and data traffic according to the different service RFCs. How can your data and VOIP traffic be marked?()A、data marked with DSCP AF21,VOIP marked with DSCP EFB、data marked with DSCP AF51,VOIP marked with DSCP EFC、data marked with the DE-bit,VOIP marked with the CLP-bitD、data marked with DSCP EF,VOIP marked with DSCP AF31E、data marked with IP precedence 5 VOIP marked with DSCP EF

考题 A data file became corrupted in your database due to bad sectors on the disk. Because of corruption, you lost all the important tables in that data file. Which method would you use for recovery?()A、flash back all the tables in the data file, one by oneB、restore the data file to a new location and perform a media recoveryC、flash back the database; there is no need to restore the data fileD、restore the data file from the most recent backup and flash back the database

考题 Your Service Provider does not support Link Fragmentation and Interleave, but upstream serialization delay on your broadband link is affecting voice quality. Which two mitigation strategies are viable?()A、Upgrade your residential broadband service to at least 768kbps uplink.B、Switch your home router to use PPP encapsulation.C、Use the ip tcp adjust-mss interface command.D、Employ QoS techniques to drop large data packets.E、Use traffic shaping to interrupt large data packets.

考题 The loss of the control file forced you to re/x7fcreate the control file. After re/x7fcreating it and opening the database, you find that some of the data files are named as MISSINGnnnnn, where nnnnn is a five/x7fdigit number starting with 0.  What could be the possible reason?()A、These are the data files that are corrupted.B、There is no SYSAUX tablespace in your databaseC、There is a read­only tablespace in your database.D、These are the data files that cannot be recovered.

考题 According to your backup strategy, you performed an incremental level 0 backup of your database. Which statement regarding this backup is true?()A、The backup is similar to image copy.B、The backup contains all used data blocks.C、The backup contains only unused data blocks.D、The backup contains all data blocks changed since the last incremental level 1 backup.

考题 You run a 16-bit scientific data analysis package on your Windows 2000 Professional computer. Thepackage consists of three components.The first component is a data acquisition application that monitors continuous data output fromscientific instruments. The second component is a data analysis application that receives data from thedata acquisition application by using shared memory. The third component is a data graphingapplication that displays the processed data in real time.The data analysis application communicates with the data graphing application by using OLE. When youattempt to analyze large data sets, your computer is not able to display data in real time. You install asecond processor in your computer. Only one processor is used while the package is running, even thoughtask manager shows both processors.You want your data analysis package to use both processors. What should you do?()A、Configure the data acquisition application to run in its own virtual DOS machine (VDM). B、Configure the data analysis application to run in its own virtual DOS machine (VDM). C、Configure the data graphing application to run in its own virtual DOS machine (VDM). D、Configure the virtual DOS machine for the data acquisition and data analysis applications to have a hard affinity for processor 0. Configure the VDM for the data graphing application to have a hard affinity for processor1. E、Configure the virtual DOS machine for the data acquisition to have a hard affinity for processor 0.Configure the VDM for the data graphing application to have a hard affinity for processor1.

考题 Your company network has 500 client computers that run Windows 7. Your team consists of 20 desktop support technicians. Two technicians troubleshoot a hardware-related performance issue on a computer. The technicians obtain different results by using their own User Defined Data Collector Sets. You need to create a standardized Data Collector Set on a network share that is accessible to your team. What should you create?()A、Event Trace Data Collector SetB、Performance Counter Data Collector SetC、Performance Counter Alert Data Collector SetD、System Configuration Information Data Collector Set

考题 Rate your level of proficiency with restoring and backing up Windows XP Professional, system state data, and user data.()A、Very HighB、HighC、ModerateD、LowE、Very Low

考题 多选题In a design situation, there are multiple character sets that can properly encode your data. Which three should influence your choice of character set?()ASyntax when writing queries involving JOINSBMemory usage when working with the dataCCharacter set mapping index hash sizeDDisk usage when storing data

考题 单选题ou have a large amount of historical data in a flat file. Some analysts in your organization need to query thisdata in the file. The file is too large to load the data in it into your current database.  Which is the most effectivemethod to access this data in your database()A Use the database link.B Use the SQL*Loader utility.C Use the Oracle Data Pump utility.D Create an external table and leave the data in the flat file

考题 单选题Rate your level of proficiency with restoring and backing up Windows XP Professional, system state data, and user data.()A Very HighB HighC ModerateD LowE Very Low

考题 单选题You have a large amount of historical data in a flat file. Some analysts in your organization need toquery this data in the file. The file is too large to load the data in it into your current database.  Which is the most effective method to access this data in your database()A Use the database link.B Use the SQL*Loader utility.C Use the Oracle Data Pump utility.D Create an external table and leave the data in the flat file

考题 单选题According to your backup strategy, you performed an incremental level 0 backup of your database. Which statement regarding this backup is true?()A The backup is similar to image copy.B The backup contains all used data blocks.C The backup contains only unused data blocks.D The backup contains all data blocks changed since the last incremental level 1 backup.

考题 多选题You run a 16-bit scientific data analysis package on your Windows 2000 Professional computer. The package consists of three components. The first component is a data acquisition application that monitors continuous data output from scientific instruments. The second component is a data analysis application that receives data from the data acquisition application by using shared memory. The third component is a data graphing application that displays the processed data in real time.  The data analysis application communicates with the data graphing application by using OLE. When you attempt to analyze large data sets, your computer is not able to display data in real time. You install a second processor in your computer; only one processor is used while the package is running, even though task manager shows both processors.   You want your data analysis package to use both processors. What should you do?()AConfigure the data acquisition application to run in its own virtual DOS machine (VDM).BConfigure the data analysis application to run in its own virtual DOS machine (VDM).CConfigure the data graphing application to run in its own virtual DOS machine (VDM).DConfigure the virtual DOS machine for the data acquisition and data analysis applications to.have a hard affinity for processor 0. Configure the VDM for the data graphing application to.have a hard affinity for processor1.EConfigure the virtual DOS machine for the data acquisition to have a hard affinity for processor 0. Configure the VDM for the data graphing application to have a hard affinity for processor1.

考题 单选题You are operating your database in NOARCHIVELOG mode. Your most recent backup includes a copy of all of the data files and the control files taken when the current log sequence number was 45. You experience disk failure on the drive on which your SYSTEM tablespace data files are stored. At the time of the failure, the current log sequence number is 98. Which files should you restore to recover from the loss of the SYSTEM tablespace data files?()A Only the data files.B All of the data files and the control files.C Only the data files belonging to the SYSTEM tablespace.D Only the data files belonging to the SYSTEM tablespace and the control files.

考题 单选题You are creating an online catalog application that will display product information on the company Web site. The product data is stored in a SQL Server 2005 database. The data is stored as relational data but must be passed to the application as an XML document by using FOR XML. You test your application and notice that not all of the items matching your query appear in the XML document. Only those products that have values for all elements in the schema appear.   You need to modify your Transact-SQL statement so that all products matching your query appear in the XML document. What should you do?()A Add an XML index to the table that contains the product data.B Add the XSINIL argument to the ELEMENTS directive in the query.C Add a HAVING clause to the query.D Add the replace value of clause to the query.

考题 单选题You have a large amount of historical data in an operating system file. Some analysts in your organization need to query this data. The file is too large to load into your current database. Which is the most effective method to accomplish the task?()A Upgrade the hardware/memory to accommodate the data.B Load the data into your database by using the PARALLEL clause.C Give analysts DBA privilege, so that they can query DBA_EXTERNAL_TABLES.D Use an external table so you can have the metadata available in your database, but leave the data in the operating system files.

考题 单选题You are using flat files as the data source for one of your data warehousing applications. You plan to move the data from the flat file structures to an Oracle database to optimize the application performance. In your database you have clustered tables.  While migrating the data, you want to have minimal impact on the database performance and optimize the data load operation. Which method would you use to load data into Oracle database?()A use the external table populationB use the Oracle Data Pump export and import utilityC use the conventional path data load of SQL*Loader utilityD use the direct path data load of Oracle export and import utility

考题 多选题You lost a data file that belongs to an index tablespace in your database, which operates in ARCHIVELOG mode. Loss of the data file resulted in increased response time on your queries. Which two options would you use to solve this problem? ()ARestore the lost data file from the backup, and then flash back the database.BRestore the data file pertaining to index tablespace, and then recover the tablespace.CRestore all the data files, and then perform an incomplete recovery to get the tablespace back.DRestore all the data files, and then perform an incomplete recovery using the backup control file.EDrop and re-create the index tablespace, and then re-create all of the indexes in that tablespace.

考题 单选题The loss of the control file forced you to re-create the control file. After re-creating it and opening the database, you find that some of the data files are named as MISSINGnnnnn, where nnnnn is a five-digit number starting with 0. What could be the possible reason?()A  These are the data files that are corrupted.B  There is no SYSAUX tablespace in your databaseC  There is a read-only tablespace in your database.D  These are the data files that cannot be recovered.

考题 单选题You work as a database administrator for Certkiller .com. Your database is in NOARCHIVELOG mode. The database has been configured with three redo logs groups, and there have been five log switches. You lost one non-system-critical data file from your database.  Which method would you use to recover the data file?()A Restore all the data files and open the databaseB Create the data file and performtablespacerecoveryC No need to restore any file, just recover the databaseD Restore only the system data file and recover the databaseE Restore only lost date file and performtablespacerecovery