网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
ou have a large amount of historical data in a flat file. Some analysts in your organization need to query thisdata in the file. The file is too large to load the data in it into your current database. Which is the most effectivemethod to access this data in your database()
- A、Use the database link.
- B、Use the SQL*Loader utility.
- C、Use the Oracle Data Pump utility.
- D、Create an external table and leave the data in the flat file
参考答案
更多 “ ou have a large amount of historical data in a flat file. Some analysts in your organization need to query thisdata in the file. The file is too large to load the data in it into your current database. Which is the most effectivemethod to access this data in your database()A、Use the database link.B、Use the SQL*Loader utility.C、Use the Oracle Data Pump utility.D、Create an external table and leave the data in the flat file” 相关考题
考题
You are the administrator of a SQL Server 2000 computer in your company's personnel department. Employee data is stored in a SQL Server 2000 database. A portion of the database schema is shown in the exhibit.You want to create a text file that lists these data columns in the following format title, FirstName, LastName, WorkPhone, PositionName, DepartmentName.You want to create the text file as quickly as possible. You do not expect to re-create this file, and you want to avoid creating new database objects if possible.What should you do?A.Use the bcp utility to export data from each table to a separate text file. Use format files to select the appropriate columns. Merge the data from each text file into a single text file.B.Create a view that joins data from all three tables include only the columns you want to appear in the text file. Use the bcp utility to export data from the view.C.Create a SELECT query that joins the data from the appropriate columns in the three tables. Add an INTO clause to the query to create a local temporary table. Use the bcp utility to export data from the local temporary table to a text file.D.Create a SELECT query that joins the data from the appropriate columns in the three tables. Add an INTO clause to the query to create a global temporary table. Use the bcp utility to export data from the global temporary table to a text file.
考题
You are the administrator of a Windows 2000 Server computer. A folder named HR-Data on the system partition of the server is shared on the network as HR-Data. The owner of the HR-Data folder is Administrators.The shared permissions and NTFS permissions are shown in the following table.Share permissions:Everyone: FULL ControlNTFS permissionsDomain Admins: ReadKatrin: Full ControlKatrin creates a file in the HR-Data folder. She sets the NTFS permissions for the file to list only herself on the access control list, with Full Control permission. Katrin then leaves on vacation and cannot be contacted.Later, you discover that the file contains sensitive information and must be removed from the server as soon as possible. You want to delete the file without modifying any of the permissions for other files in the HR-Data folder. You want your actions to have least possible impact on users who may be using other files in the HR-Data folder. You want to use the minimum amount of authority necessary to delete the file.What should you do?A.Grant yourself Full Control permission for only the HR-data folder and not its subobjects. Delete the file. Then remove Full Control permission for HR-Data folder.B.Take ownership of the HR-Data folder. When prompted, take ownership of the existing files. Grant yourself Full Control permission for the file. Delete the file.C.Take ownership of the file. Grant yourself Modify permission for the file. Delete the file.D.Grant yourself Modify permission for the HR-Data folder and its subobjects. Delete the file. Then remove Modify permission for the HR-Data folder.
考题
The objective of (71) is to determine what parts of the application software will be assigned to what hardware. The major software components of the system being developed have to be identified and then allocated to the various hardware components on which the system will operate. All software systems can be divided into four basic functions. The first is (72). Most information systems require data to be stored and retrieved, whether a small file, such as a memo produced by a word processor, or a large database, such as one that stores an organization's accounting records. The second function is the (请作答此空), the processing required to access data, which often means database queries in Structured Query Language. The third function is the (74), which is the logic documented in the DFDs, use cases, and functional requirements. The fourth function is the presentation logic, the display of information to the user and the acceptance of the user's commands. The three primary hardware components of a system are (75).
A. data persistence
B .data access objects
C. database connection
D. data access logic
考题
You have lost datafile 4 from your database. Which is typically the fastest way to restore your database?() A、 Restore and recover the datafile.B、 Restore and recover the tablespace.C、 Restore and recover the database.D、 Restore and recover the control file.E、 Restore and recover the parameter file.
考题
You develop a Web application that writes data to a file on a server. You restrict access to the file to specific Windows users. The Web application runs as CONTOSO/ASPNET. You deny anonymous access to the application in IIS. You add the following XML segment in the Web.config file. You need to ensure that the application meets the following requirements: 1. It must impersonate the user when it writes data to the file 2. It must run as CONTOSO/ASPNET when a user does not access the file. Which two actions should you perform?()A、Use the following XML segment in the Web.config file.identity impersonate="false"/B、 Use the following XML segment in the Web.config file.identity impersonate="true"/C、Use the following code segment to access the file. WindowsPrincipal wp =(WindowsPrincipal)HttpContext,Current.User;WindowsIdentity wt = (WindowsIdentity)wp.Idetity;WindowsImpersonationContext wic = wi.Impersonate();// Access The file herewic.Undo();D、Use the following code segment to access the file. WindowsIdentity wi = WindowsIdetity.GetCurrent();WindowsImpersonationContext wic = WindowsIdentity.Impersonate(wi.Token);// Access the file herewic.Undo();
考题
You are using flat files as the data source for one of your data warehousing applications. To optimize the application performance, you plan to move the data from the flat files to clustered tables in an Oracle database.While migrating the data, you want to have minimal impact on the database performance and optimize the dataload operation. Which method would you use to load data into the Oracle database()A、Use the external table population.B、Use the Oracle Data Pump export and import utility.C、Use the conventional path data load of the SQL*Loader utility.D、Use the INSERT INTO...SELECT command to load the data
考题
You have a large amount of historical data in a flat file. Some analysts in your organization need toquery this data in the file. The file is too large to load the data in it into your current database. Which is the most effective method to access this data in your database()A、Use the database link.B、Use the SQL*Loader utility.C、Use the Oracle Data Pump utility.D、Create an external table and leave the data in the flat file
考题
You have lost datafile 4 from your database. Which is typically the fastest way to restore your database? ()A、Restore and recover the datafile. B、Restore and recover the tablespace. C、Restore and recover the database. D、Restore and recover the control file. E、Restore and recover the parameter file.
考题
The loss of the control file forced you to re/x7fcreate the control file. After re/x7fcreating it and opening the database, you find that some of the data files are named as MISSINGnnnnn, where nnnnn is a five/x7fdigit number starting with 0. What could be the possible reason?()A、These are the data files that are corrupted.B、There is no SYSAUX tablespace in your databaseC、There is a readonly tablespace in your database.D、These are the data files that cannot be recovered.
考题
You work as a database administrator for Certkiller .com. Your database is in NOARCHIVELOG mode. The database has been configured with three redo logs groups, and there have been five log switches. You lost one non-system-critical data file from your database. Which method would you use to recover the data file?()A、Restore all the data files and open the databaseB、Create the data file and performtablespacerecoveryC、No need to restore any file, just recover the databaseD、Restore only the system data file and recover the databaseE、Restore only lost date file and performtablespacerecovery
考题
You are using flat files as the data source for one of your data warehousing applications. To optimizethe application performance, you plan to move the data from the flat files toclustered tablesin an Oracle database. While migrating the data, you want to have minimal impact on the database performance and optimize thedata load operation. Which method would you use to load data into the Oracle database()A、Use the external table population.B、Use the Oracle Data Pump export and import utility.C、Use the conventional path data load of the SQL*Loader utility.D、Use the INSERT INTO...SELECT command to load the data.
考题
A data file become corrupted in your database due to bad sectors on the disk. Because of corruption, you lost all the important tables in that data file. Which method would you use for recovery?()A、 Flash back all the tables in the data file, one by one.B、 Restore the data file to a new location and perform a media recovery.C、 Flash back the database, there is no need to restore the data file.D、 Restore the data file from the most recent backup and flash the database.
考题
You plan to move data from a flat file to a table in your database. You decide to use SQL*Loader direct pathload method to perform this task. The table in which you plan to load data is an important table having variousintegrity constraints defined on it. Which constraints will remain enabled by default during this operation()A、CHECKB、UNIQUEC、NOT NULLD、PRIMARY KEYE、FOREIGN KEY
考题
You are using flat files as the data source for one of your data warehousing applications. You plan to move the data from the flat file structures to an Oracle database to optimize the application performance. In your database you have clustered tables. While migrating the data, you want to have minimal impact on the database performance and optimize the data load operation. Which method would you use to load data into Oracle database?()A、use the external table populationB、use the Oracle Data Pump export and import utilityC、use the conventional path data load of SQL*Loader utilityD、use the direct path data load of Oracle export and import utility
考题
You plan to move data from a flat file to a table in your database. You decide to use SQL*Loader directpath load method to perform this task. The table in which you plan to load data is an important tablehaving various integrity constraints defined on it. Which constraints will remain enabled by default during this operation()A、CHECKB、UNIQUEC、NOT NULLD、PRIMARY KEYE、FOREIGN KEY
考题
You have a large amount of historical data in an operating system file. Some analysts in your organization need to query this data. The file is too large to load into your current database. Which is the most effective method to accomplish the task?()A、Upgrade the hardware/memory to accommodate the data.B、Load the data into your database by using the PARALLEL clause.C、Give analysts DBA privilege, so that they can query DBA_EXTERNAL_TABLES.D、Use an external table so you can have the metadata available in your database, but leave the data in the operating system files.
考题
In Recovery Manager (RMAN), you are taking image copies of the data files of your production database and rolling them forward at regular intervals. You attempt to restart your database. After a regular maintenance task, you realize that one of the data files that belongs to the USERS tablespace is damaged and you need to recover the data file by using the image copy. Because a media failure caused the data file to be damaged, you want to place the data file in a different location while resto ing the file. Which option must you consider for this task?() A、 using only the RMAN SWITCH command to set the new location for the data fileB、 placing the database in the MOUNT state for the restore and recovery operationsC、 using an RMAN RUN block with the SET NEWNAME and then the SWITCH commandD、 configuring two channels: one for the restore operation and the other for the recovery operation
考题
The loss of the control file forced you to re-create the control file. After re-creating it and opening the database, you find that some of the data files are named as MISSINGnnnnn, where nnnnn is a five-digit number starting with 0. What could be the possible reason?()A、 These are the data files that are corrupted.B、 There is no SYSAUX tablespace in your databaseC、 There is a read-only tablespace in your database.D、 These are the data files that cannot be recovered.
考题
You develop a Web application that writes data to a file on a server. You restrict access to the file to specific Windows users. The Web application runs as CONTOSO/ASPNET. You deny anonymous access to the application in IIS. You add the following XML segment in the Web.config file.You need to ensure that the application meets the following requirements:It must impersonate the user when it writes data to the file.It must run as CONTOSO/ASPNET when a user does not access the file. Which two actions should you perform? ()A、Use the following XML segment in the Web.config file. identity impersonate="false"/B、Use the following XML segment in the Web.config file. identity impersonate="true"/C、Use the following code segment to access the file. Dim wp As WindowsPrincipal = _CType(HttpContext.Current.User, WindowsPrincipal) Dim wi As WindowsIdentity = WindowsIdentity.GetCurrent() Dim wic As WindowsImpersonationContext = wi.Impersonate()' Access the file herewic.Undo()D、Use the following code segment to access the file. Dim wi As WindowsIdentity = WindowsIdentity.GetCurrent()Dim wic As WindowsImpersonationContext = _WindowsIdentity.Impersonate(wi.Token)' Access the file herewic.Undo()
考题
You are a database administrator for your company. The company uses a SQL Server 2005 database. A full backup of the database is made each night. Transaction log backups are made each morning and each afternoon. You notice that the database transaction log file grows very large throughout the day. You need to minimize the size of the transaction log file. You also need to minimize data loss in the event of a failure. What should you do?()A、Decrease the amount of time between transaction log backups.B、Configure the database to use the simple recovery model.C、Configure the RECOVERY INTERVAL option to be a smaller value.D、Run DBCC SHRINKFILE on the transaction log file.
考题
Your SQL Server 2005 database contains a table that has 500 million rows of data. Some of the data is historical and some is current. You need to partition the data on a single server to increase performance and optimize maintenance. What should you do?()A、Implement horizontal partitioning.B、Implement vertical partitioning.C、Implement a raw partition.D、Implement distributed partitioning.
考题
单选题You have lost datafile 4 from your database. Which is typically the fastest way to restore your database? ()A
Restore and recover the datafile. B
Restore and recover the tablespace. C
Restore and recover the database. D
Restore and recover the control file. E
Restore and recover the parameter file.
考题
单选题A data file become corrupted in your database due to bad sectors on the disk. Because of corruption, you lost all the important tables in that data file. Which method would you use for recovery?()A
Flash back all the tables in the data file, one by one.B
Restore the data file to a new location and perform a media recovery.C
Flash back the database, there is no need to restore the data file.D
Restore the data file from the most recent backup and flash the database.
考题
单选题You have lost datafile 4 from your database. Which is typically the fastest way to restore your database?()A
Restore and recover the datafile.B
Restore and recover the tablespace.C
Restore and recover the database.D
Restore and recover the control file.E
Restore and recover the parameter file.
考题
单选题You have a large amount of historical data in an operating system file. Some analysts in your organization need to query this data. The file is too large to load into your current database. Which is the most effective method to accomplish the task?()A
Upgrade the hardware/memory to accommodate the data.B
Load the data into your database by using the PARALLEL clause.C
Give analysts DBA privilege, so that they can query DBA_EXTERNAL_TABLES.D
Use an external table so you can have the metadata available in your database, but leave the data in the operating system files.
考题
单选题There is a problem with one of the disks used for your database and your system administrator informs you that the disk needs to be replaced. The replacement disk will not be available until tomorrow. There was only one data file on this disk; it belongs to the USERS tablespace in your PROD database. Your PROD database runs in ARCHIVELOG mode and nightly online backups are taken. The users need to be able to access the data in the USERS tablespace before the replacement disk arrives. You have already taken the USERS tablespace offline and have restored the data file from last night’s backup to a new disk. Which additional steps are required in order to make the USERS tablespace available?()A
Only bring the tablespace back online.B
Only recover the tablespace and then bring the tablespace back online.C
Shut down the database, recover the data file and then start up the database.D
Issue the ALTER DATABASE RENAME FILE command, recover the tablespace, and then bring the tablespace online.E
Recover the tablespace, issue the ALTER DATABASE RENAME FILE command, and then bring the tablespace online.
考题
单选题The loss of the control file forced you to re-create the control file. After re-creating it and opening the database, you find that some of the data files are named as MISSINGnnnnn, where nnnnn is a five-digit number starting with 0. What could be the possible reason?()A
These are the data files that are corrupted.B
There is no SYSAUX tablespace in your databaseC
There is a read-only tablespace in your database.D
These are the data files that cannot be recovered.
热门标签
最新试卷