网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

All data are stored in stacked semiconductor dynamic RAM memory boards; the information recorded,the()rate,and the order in which the data are stored differ.

A.receiving B.stacking C.sampling D.erasing


参考答案

更多 “ All data are stored in stacked semiconductor dynamic RAM memory boards; the information recorded,the()rate,and the order in which the data are stored differ.A.receiving B.stacking C.sampling D.erasing ” 相关考题
考题 Data stored in RAM ( ) when the power of the computer is turned off. A.is held permanentlyB.permanently disappearsC.is held temporarilyD.temporarily disappears

考题 Indentify two advantages of using recovery catalog instead of the control file of the database in Recovery Manager (RMAN)?() A. You can use RMAN stored scriptsB. Recovery is faster if data is stored in catalog in addition to the control fileC. You can store backup information of all registered databases in one placeD. Database backups are automatically deleted when they are older than the specified time period

考题 Which two statements about the SQL Management Base (SMB) are true?() A. It contains only SQL profiles generated by SQL Tuning Advisor.B. It stores plans generated by the optimizer using a stored outline.C. It is part of the data dictionary and stored in the SYSAUX tablespace.D. It is part of the data dictionary and stored in the SYSTEM tablespace.E. It contains the statement log, the plan history, plan baselines, and SQL profiles.

考题 You are the administrator of a SQL Server 2000 computer. The server contains confidential information about contracts on which your company has placed bids.Company policy requires that bid information be removed permanently from the database one year after the bid closes. You need to comply with this policy and minimize server overhead.What should you do?A.Create a Data Transformation Services (DTS) package to remove bids that have a closing data older than one year.B.Create a trigger to delete any bids that have a closing data older than one year. Bind the trigger to the bids table for all INSERT, UPDATE, and DELETE events.C.Create a stored procedure to delete any bids that have a closing data order than one year. Use SQL server agent to schedule the stored procedure to run every night.D.Create a view that contains a WHERE clause to exclude bids that have a closing date older than one year.

考题 The processor manipulates data stored in main memory under the control of a(71)stored in main memory.A.commandB.programC.operationD.code

考题 Which of the following defines memory interleaving?() A. The distribution of data written across all the memory DIMMs and the L1 cacheB. The distribution of data written across all the memory DIMMs in one bankC. The distribution of data written across all the memory DIMMs and the processorD. The distribution of data written across all the memory DIMMs and the L2 cache

考题 We know a computer is a machine that processes data(stored in main memory)into information, under control of a stored program. We also know that, internally, a computer is a binary machine; thus the data and the program instruictions must be stored in binary form. Characters are represented in(71). Numbers are stored as binary numbers, with each bit's positional value significant. A computer's main memory is divided into bytes, words or both(depending on the system), and each of these basic storage units is assigned an(72). Using this address, the processor can read or write selected bytes or words.The processor consists of a clock, an instruction control unit, an arithmetic and logic unit, and registers. Once a program is stored in main memory, the processor can begin to execute it. During(73), the instruction control unit fetches an instruction from main memory; during(74), the arithmetic and logic unit executes it. Precisely timed electronic pulses generated by the clock drive this basic(75)A.a binary codeB.wordsC.registersD.positional values

考题 Whenever new information is entered, it must be stored somewhere in the computer's(70). RAM only(71)the data temporarily. That is, all information stored in the RAM will disappear if you switch the computer off.A.processorB.keyboardC.printerD.memory

考题 ●A (73) is a named memory block. By using its name, we can refer to the data stored in the memory block.(73)A.wordB.recordC.programD.variable

考题 ●An instruction that use indirect addressing must contain an address of memory where () 。()A. data is stored B. a pipeline stall will be executedC. a page fault is addressed D. another address is stored

考题 Which of the following defines memory interleaving?()A、The distribution of data written across all the memory DIMMs and the L1 cacheB、The distribution of data written across all the memory DIMMs in one bankC、The distribution of data written across all the memory DIMMs and the processorD、The distribution of data written across all the memory DIMMs and the L2 cache

考题 A major difference between archiving and backing up data is that data backups:()A、contain data removed from the server.B、contain data that still resides on the server.C、are stored with the servers.D、are stored securely.

考题 Which of the following MOST correctly describes a hot spare?()A、A drive assigned to an array that will only hold parity information used for rebuilding a failedarray drive.B、An external hard drive to which all data is replicated to for recovery in the event of a failure.C、A drive assigned to an array that will automatically be used to rebuild a failed array drive.D、An extra drive purchased and stored in the parts cabinet to replace failed drives.

考题 A customer is planning to migrate a financial application to a 12-way p5-570 system with 96GB of memory.  The application data is stored on an ESS Model 800 attached to a p670 server with AIX 5.2.  They will have a short outage window to perform the data migration.  What is the quickest way to move all the data stored on the attached ESS from the p670 to the new p5-570?()A、Use rsync to synchronize the data across servers.B、Use exportvg and importvg to move the data to the target system.C、Use NFS to copy the data from the source system to the target system.D、Backup the data from the source system and restore to the target system.

考题 A pSeries server is being used as a file server and all data is stored on a non-root volume group and resides on mounted filesystems. Which of the following commands provides the quickest way to backup all of the data and filesystem definitions?()A、tarB、cpioC、savefsD、savevg

考题 A customer has a large amount of data stored on three database servers and is concerned that at present there is no disaster recovery plan in place.  They have an existing tape backup solution that meets their backup window.  In order to analyze potential disaster recovery plans, which of the following questions is the most important?()A、What is the minimum critical backup window?B、Which server is handling the most critical data?C、How much data is stored on each server?D、What is the throughput of the hard drives?

考题 ENCRYPT_TS is an encrypted tablespace that contains tables with data. Which statement is true regarding the effect of queries and data manipulation language (DML) statements on the encrypted data in the tables?()A、The data is decrypted during SORT and JOIN operations.B、The data remains encrypted when it is read into memory.C、The data remains encrypted when it is stored in the redo logs.D、The data remains encrypted in the UNDO tablespace provided that the UNDO tablespace was created with the encryption option enabled.

考题 Records from the data dictionary information are stored in which of the following database memory areas?()A、Library cache B、Row cache C、Session UGA D、Buffer cache

考题 Which three statements are true about Automatic Workload Repository (AWR)?()A、All AWR tables belong to the SYSTEM schema.B、The AWR data is stored in memory and in the database.C、The snapshots collected by AWR are used by the self-tuning components in the databaseD、AWR computes time model statistics based on time usage for activities, which are displayed in the v$SYS time model and V$SESS_TIME_MODEL views.E、AWR contains system wide tracing and logging information.

考题 Indentify two advantages of using recovery catalog instead of the control file of the database in RecoveryManager (RMAN).()(Choose two.)A、You can use RMAN stored scriptsB、Recovery is faster if data is stored in catalog in addition to the control fileC、You can store backup information of all registered databases in one placeD、Database backups are automatically deleted when they are older than the specified time period

考题 Indentify two advantages of using recovery catalog instead of the control file of the database in Recovery Manager (RMAN).()A、 You can use RMAN stored scriptsB、 Recovery is faster if data is stored in catalog in addition to the control fileC、 You can store backup information of all registered databases in one placeD、 Database backups are automatically deleted when they are older than the specified time period

考题 What criterion does Oracle9i use to determine whether a database file is an Oracle Managed File?() A、The filename format. B、Information stored inside a data dictionary table. C、Information stored in the ALERT.LOG file for the corresponding instance. D、Information stored inside the corresponding initialization parameter file for the instance.

考题 You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()A、Encrypt customer information when it is stored and when it is being transmittedB、Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkC、Encrypt all marketing information on file servers and client computersD、Require encrypted connections to all file servers

考题 单选题ENCRYPT_TS is an encrypted tablespace that contains tables with data. Which statement is true regarding the effect of queries and data manipulation language (DML) statements on the encrypted data in the tables?()A  The data is decrypted during SORT and JOIN operations.B  The data remains encrypted when it is read into memory.C  The data remains encrypted when it is stored in the redo logs.D  The data remains encrypted in the UNDO tablespace provided that the UNDO tablespace was created with the encryption option enabled.

考题 单选题Which of the following defines memory interleaving?()A  The distribution of data written across all the memory DIMMs and the L1 cacheB  The distribution of data written across all the memory DIMMs in one bankC  The distribution of data written across all the memory DIMMs and the processorD  The distribution of data written across all the memory DIMMs and the L2 cache

考题 单选题A major difference between archiving and backing up data is that data backups:()A contain data removed from the server.B contain data that still resides on the server.C are stored with the servers.D are stored securely.

考题 单选题A customer has a large amount of data stored on three database servers and is concerned that at present there is no disaster recovery plan in place.  They have an existing tape backup solution that meets their backup window.  In order to analyze potential disaster recovery plans, which of the following questions is the most important?()A What is the minimum critical backup window?B Which server is handling the most critical data?C How much data is stored on each server?D What is the throughput of the hard drives?