单选题An application needs to store a 5 MB JPEG image in a DB2 table. Which data type should be specified for the column that will be used for storing the image?()A GRAPHICB BINARYC IMAGED BLOB

题目
单选题
An application needs to store a 5 MB JPEG image in a DB2 table. Which data type should be specified for the column that will be used for storing the image?()
A

GRAPHIC

B

BINARY

C

IMAGE

D

BLOB


相似考题
参考答案和解析
正确答案: A
解析: 暂无解析
更多“单选题An application needs to store a 5 MB JPEG image in a DB2 table. Which data type should be specified for the column that will be used for storing the image?()A GRAPHICB BINARYC IMAGED BLOB”相关问题
  • 第1题:

    For an incomplete recovery, which four backup types can be used by Recovery Manager (RMAN) to restore data files? ()

    • A、RMAN image copies
    • B、RMAN database backups
    • C、RMAN tablespace backups
    • D、user­managed backups placed in the flash recovery area
    • E、user­managed backups that have been cataloged with RMAN
    • F、user­managed data file backups for which the full path name is specified

    正确答案:A,B,C,E

  • 第2题:

    Which three statements are true regarding the data types in Oracle Database 10g/11g?()

    • A、Only one LONG column can be used per table 
    • B、A TIMESTAMP data type column stores only time values with fractional seconds 
    • C、The BLOB data type column is used to store binary data in an operating system file 
    • D、The minimum column width that can be specified for a VARCHAR2 data type column is one 
    • E、The value for a CHAR data type column is blank-padded to the maximum defined column width

    正确答案:A,D,E

  • 第3题:

    You work as an Exchange Administrator for TechWorld Inc.The company has a Windows 2008 Active Directory-based contains an Exchange Server 2010 organization.The CIO has requested you to ensure that all emails with JPEG at that they are not allowed into the users’ mailboxes.You decide to use the Exchange Management Shell.Which of t you use to accomplish the task?()

    • A、Add-AttachmentFilterEntry -Name image/jpeg -Type FileName
    • B、Add-AttachmentFilterEntry -Name *.exe -Type FileName
    • C、Add-AttachmentFilterEntry -Name image/jpeg -Type ContentType
    • D、Add-AttachmentFilterEntry -Name ".jpeg -Type ContentType

    正确答案:C

  • 第4题:

    You work as an Exchange Administrator for Xxx Inc.The company has a Windows 2008 Active Directorybased network.The network contains an Exchange Server 2010 organization.The CIO has requested you to ensure that all emails with JPEG attachments be filtered so that they are not allowed into the users’ mailboxes.You decide to use the Exchange Management Shell.Which of the following commands will you use to accomplish the task?()

    • A、Add-AttachmentFilterEntry -Name *.jpeg -Type ContentType
    • B、Add-AttachmentFilterEntry -Name *.exe -Type FileName
    • C、Add-AttachmentFilterEntry -Name image/jpeg -Type ContentType
    • D、Add-AttachmentFilterEntry -Name image/jpeg -Type FileName

    正确答案:C

  • 第5题:

    You work as the application developer at Certkiller .com. Certkiller .com uses Visual Studio.NET 2005 as its application development platform.You are developing a .NET Framework 2.0 application used to store a type-safe list of names and e-mail addresses. The list will be populated all at ones from the sorted data which means you well not always need to perform insertion or deletion operations on the data. You are required to choose a data structure that optimizes memory use and has good performance.What should you do?()

    • A、 The System.Collections.Generic.SortedList class should be used
    • B、 The System.Collections.HashTable class should be used
    • C、 The System.Collections.Generic.SortedDictionary class should be used
    • D、 The System.Collections.SortedList class should be used

    正确答案:A

  • 第6题:

    You are designing a Windows Azure application that will allow for the processing of image files. Images will be processed in batches by remote applications running on multiple servers.  The application must meet the following requirements:   - Remain operational during batch-processing operations. - Allow users to roll back each image to previous versions.    Each remote application must have exclusive access to an image while processing it. You need to recommend an approach for storing the images.  What should you recommend?()

    • A、 Store the images in a Windows Azure Queue.
    • B、 Store theimages in Windows Azure Blob storage.
    • C、 Store the images in Windows Azure Table storage.
    • D、 Store images in a single Windows Azure Drive attached to the web role.

    正确答案:B

  • 第7题:

    单选题
    An application needs to store a 5 MB JPEG image in a DB2 table. Which data type should be specified for the column that will be used for storing the image?()
    A

    GRAPHIC

    B

    BINARY

    C

    IMAGE

    D

    BLOB


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    You work as an Exchange Administrator for TechWorld Inc.The company has a Windows 2008 Active Directory-based contains an Exchange Server 2010 organization.The CIO has requested you to ensure that all emails with JPEG at that they are not allowed into the users’ mailboxes.You decide to use the Exchange Management Shell.Which of t you use to accomplish the task?()
    A

    Add-AttachmentFilterEntry -Name image/jpeg -Type FileName

    B

    Add-AttachmentFilterEntry -Name *.exe -Type FileName

    C

    Add-AttachmentFilterEntry -Name image/jpeg -Type ContentType

    D

    Add-AttachmentFilterEntry -Name .jpeg -Type ContentType


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    You work as an Exchange Administrator for Xxx Inc.The company has a Windows 2008 Active Directorybased network.The network contains an Exchange Server 2010 organization.The CIO has requested you to ensure that all emails with JPEG attachments be filtered so that they are not allowed into the users’ mailboxes.You decide to use the Exchange Management Shell.Which of the following commands will you use to accomplish the task?()
    A

    Add-AttachmentFilterEntry -Name *.jpeg -Type ContentType

    B

    Add-AttachmentFilterEntry -Name *.exe -Type FileName

    C

    Add-AttachmentFilterEntry -Name image/jpeg -Type ContentType

    D

    Add-AttachmentFilterEntry -Name image/jpeg -Type FileName


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    You are designing a Windows Azure application that will process images.  The maximum size of an image is 10 MB.   The application includes a web role that allows users to upload images and a worker role with multiple instances that processes the images.   The web role communicates with the worker role by using a Windows Azure Queue.  You need to recommend an approach for storing images that minimizes storage transactions.  What should you recommend? ()
    A

     Store images in the queue.

    B

     Store images in Windows Azure Blob storage.  Store references to the images in the queue.

    C

     Store images in local storage on the web role instance.  Store references to the images in the queue.

    D

     Store images in Windows Azure Drives attached to the worker role instances. Storereferences to the images in the queue.


    正确答案: A
    解析: 暂无解析

  • 第11题:

    多选题
    For an incomplete recovery, which four backup types can be used by Recovery Manager (RMAN) to restore data files? ()
    A

    RMAN image copies

    B

    RMAN database backups

    C

    RMAN tablespace backups

    D

    user­managed backups placed in the flash recovery area

    E

    user­managed backups that have been cataloged with RMAN

    F

    user­managed data file backups for which the full path name is specified


    正确答案: C,A
    解析: 暂无解析

  • 第12题:

    单选题
    An application uses Windows Azure Table storage. The application uses five tables.  One table used by the application is approaching the limit for storage requests per second.  You need to recommend an approach for avoiding data access throttling.  What should you recommend?()
    A

     Use a single partition key for the table.

    B

     Compress data before storing it in the table.

    C

     Create additional partition keys for the table.

    D

     Continually remove unnecessary data from the table.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    An application needs to store a 5 MB JPEG image in a DB2 table. Which data type should be specified for the column that will be used for storing the image?()

    • A、GRAPHIC
    • B、BINARY
    • C、IMAGE
    • D、BLOB

    正确答案:D

  • 第14题:

    An application uses Windows Azure Table storage. The application uses five tables.  One table used by the application is approaching the limit for storage requests per second.  You need to recommend an approach for avoiding data access throttling.  What should you recommend?()

    • A、 Use a single partition key for the table.
    • B、 Compress data before storing it in the table.
    • C、 Create additional partition keys for the table.
    • D、 Continually remove unnecessary data from the table.

    正确答案:C

  • 第15题:

    You are designing a Windows Azure application that will process images.  The maximum size of an image is 10 MB.   The application includes a web role that allows users to upload images and a worker role with multiple instances that processes the images.   The web role communicates with the worker role by using a Windows Azure Queue.  You need to recommend an approach for storing images that minimizes storage transactions.  What should you recommend? ()

    • A、 Store images in the queue.
    • B、 Store images in Windows Azure Blob storage.  Store references to the images in the queue.
    • C、 Store images in local storage on the web role instance.  Store references to the images in the queue.
    • D、 Store images in Windows Azure Drives attached to the worker role instances. Storereferences to the images in the queue.

    正确答案:B

  • 第16题:

    You administer a SQL Server 2008 instance. The instance hosts a database that is used by a Web-based application. The application processes 15,000 transactions every minute. A table in the database contains a column that is used only by the application. This column stores sensitive data. You need to store the sensitive data in the most secure manner possible. You also need to ensure that you minimize the usage of memory space and processor time. Which encryption type should you use?()

    • A、Symmetric key encryption
    • B、Asymmetric key encryption
    • C、Certificate-based encryption
    • D、Transparent data encryption

    正确答案:A

  • 第17题:

    You work as an application developer at CER-Tech.com. Cert-Tech.com uses Visual studio.NET 2005 as its Application Development platform.You are developing a .NET Framework 2.0 application used to store a type-safe list of names and e-mail addresses. The list will be populated all at ones from the sorted data which means you will not always need to perform insertion or deletion operations on the data. You are required to choose a data structure that optimizes memory use and has good performance.What should you do?()

    • A、 The System.Collections.Generic.SortedList class should be used 
    • B、 The System.Collections.HashTable class should be used
    • C、 The System.Collections.Generic.SortedDictionary class should be used 
    • D、 The System.Collections.SortedList class should be used

    正确答案:A

  • 第18题:

    Your company plans to upgrade all client computers to Windows 7.   The company uses a custom line-of-business application. The application contains sensitive data.  The application will not run on Windows 7  You establish that Microsoft Enterprise Desktop Virtualization (MED-V) v2 is the appropriate technology to allow your organization to continue to use the application.    You need to ensure that the virtual machine (VM) images that contain sensitive data can be used only when the user is connected to the MED-V server.  What should you do?()

    • A、Use BitLocker Drive Encryption to encrypt the drive on which the VM image is stored.
    • B、In the MED-V console, configure the MED-V workspace to prevent offline operation.
    • C、Using MED-V TrimTransfer technology, deploy the VM image over the network.
    • D、Using Microsoft System Center Configuration Manager, deploy the VM image to an image store directory.

    正确答案:B

  • 第19题:

    单选题
    Your company plans to upgrade all client computers to Windows 7.   The company uses a custom line-of-business application. The application contains sensitive data.  The application will not run on Windows 7  You establish that Microsoft Enterprise Desktop Virtualization (MED-V) v2 is the appropriate technology to allow your organization to continue to use the application.    You need to ensure that the virtual machine (VM) images that contain sensitive data can be used only when the user is connected to the MED-V server.  What should you do?()
    A

    Use BitLocker Drive Encryption to encrypt the drive on which the VM image is stored.

    B

    In the MED-V console, configure the MED-V workspace to prevent offline operation.

    C

    Using MED-V TrimTransfer technology, deploy the VM image over the network.

    D

    Using Microsoft System Center Configuration Manager, deploy the VM image to an image store directory.


    正确答案: D
    解析: 暂无解析

  • 第20题:

    多选题
    Which three statements are true regarding the data types in Oracle Database 10g/11g?()
    A

    Only one LONG column can be used per table

    B

    A TIMESTAMP data type column stores only time values with fractional seconds

    C

    The BLOB data type column is used to store binary data in an operating system file

    D

    The minimum column width that can be specified for a VARCHAR2 data type column is one

    E

    The value for a CHAR data type column is blank-padded to the maximum defined column width


    正确答案: C,E
    解析: 暂无解析

  • 第21题:

    单选题
    You are designing a Windows Azure application that will allow for the processing of image files. Images will be processed in batches by remote applications running on multiple servers.  The application must meet the following requirements:   - Remain operational during batch-processing operations. - Allow users to roll back each image to previous versions.    Each remote application must have exclusive access to an image while processing it. You need to recommend an approach for storing the images.  What should you recommend?()
    A

     Store the images in a Windows Azure Queue.

    B

     Store theimages in Windows Azure Blob storage.

    C

     Store the images in Windows Azure Table storage.

    D

     Store images in a single Windows Azure Drive attached to the web role.


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    You work as an application developer at CER-Tech.com. Cert-Tech.com uses Visual studio.NET 2005 as its Application Development platform.You are developing a .NET Framework 2.0 application used to store a type-safe list of names and e-mail addresses. The list will be populated all at ones from the sorted data which means you will not always need to perform insertion or deletion operations on the data. You are required to choose a data structure that optimizes memory use and has good performance.What should you do?()
    A

     The System.Collections.Generic.SortedList class should be used 

    B

     The System.Collections.HashTable class should be used

    C

     The System.Collections.Generic.SortedDictionary class should be used 

    D

     The System.Collections.SortedList class should be used


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    You administer a SQL Server 2008 instance. The instance hosts a database that is used by a Web-based application. The application processes 15,000 transactions every minute. A table in the database contains a column that is used only by the application. This column stores sensitive data. You need to store the sensitive data in the most secure manner possible. You also need to ensure that you minimize the usage of memory space and processor time. Which encryption type should you use?()
    A

    Symmetric key encryption

    B

    Asymmetric key encryption

    C

    Certificate-based encryption

    D

    Transparent data encryption


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    In addition to the partition profile backup, how should the HMC be backed up to provide bare-metal restore capabilities?()
    A

    Backup critical console data

    B

    Backup a bootable image to tape

    C

    Create mksysb image and store on a NIM server

    D

    Create mksysb image and store on an NFS server


    正确答案: A
    解析: 暂无解析