Data transfer is slow between the source and destination. Th

题目
单选题
Data transfer is slow between the source and destination. The quality of service requested by the transport layer in the OSI reference model is not being maintained. To fix this issue, at which layer should the troubleshooting process begin?()
A

presentation

B

session

C

transport

D

network

E

physical

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

In the open systems interconnection (OSI) reference model, "layer" means one of seven conceptually complete,(71) arranged groups of services, functions, and protocols, that extend across all open systems.Application layer provides means for the application(72) to access the OSI environment. Presentation layer provides for the selection of a common syntax for representing data.(73) layer provides the means necessary for cooperating presentation entities to organize and synchronize their dialog and to manage their data exchange. Transport layer provides a reliable end-to-end data transfer service. Network layer provides for the entities in the transport layer the means for transferring blocks of data, by(74) and switching through the network between the open systems in which those entities reside. Data link layer provides services to transfer data between network layer entities. Physical layer provides the mechanical, electrical, functional, and procedural means to establish, maintain and(75) physical connections for transfer of bits over a transmission medium.

A.rankly

B.levelly

C.layered

D.hierarchically


正确答案:D

第2题:

A general purpose MySQL instance is configured with the following options:—log-slow-queries—long-query-time=,0001—log-slow-admin-queries—general-log—log-bin—binlog-format=STATEMENT—innodb-flush-log-at-trx-commit=1Which three statements are true()。

A.The General Query Log records more data than the Binary Log

B.The binary Log records more data than the General Query Log

C.The Slow Query Log records more data than the General Query Log

D.The General Query Log records more data than the Slow Query Log

E.The Slow Query Log records more data than the Binary Log

F.The Binary Log records more data than the Slow Query Log


参考答案:A, D, E

第3题:

You are the administrator of several SQL Server 2000 computers. A data Transformation Services (DTS) package uses native OLE DB providers to transfer data between the servers. Connection details for the servers are specified in .udl files. The .udl files are frequently updated as connection details change.

You want to distribute the DTS package as a file to developers in your company. You want to make sure connection details are available to developers who receive the DTS package.

Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two)

A.Enable the Always read properties from UDL file option in the Connection Properties dialog box.

B.Disable the Always read properties from UDL file option in the Connection Properties dialog box.

C.Delete the .udl files and store connection details in the registry by using system data source names.

D.Delete the .udl files, and store connection details in the registry by using user data source names.

E.Make the .udl files available on a network share.


正确答案:AE
解析:Explanation:
A: To make the connection information available for the developers we must enable the Always read properties from UDL file option.

E: We provide the developers with access to the .udl file by placing the .udl files in a network share and setting appropriate share and NTFS permissions.

Note: In SQL Server 2000, DTS packages can use Microsoft Data Link (.udl) files to create OLE DB connections and resolve the connections in run time. With this feature we can encapsulate the connection properties from a DTS package into a separate file and can edit the connection string in a .udl file instead of the connection properties in a DTS package in situations where connection information such as the server name, login, or even the OLE DB provider may change.

When specifying a data link connection, we must first specify whether to load an existing .udl file or create a data link to save with DTS Designer. If we want to use a .udl file rather than saving the data link with DTS Designer, we can create one either from Windows Explorer or during the data link configuration process in DTS Designer. We must then click Microsoft Data Link in the Data Source list of the Connection Properties dialog box and check the Always read properties from UDL file check box. In this scenario, the .udl file is already specified.

Incorrect Answers:
B: If we clear the Always read properties from UDL file option in the Connection Properties dialog box, we would have to edit the connection properties through the Data Transformation Services (DTS) package. This would increase administrative effort.

C: We cannot delete the .udl files and instead store the connection details in the registry by using system data source names as the connection details change regularly.

D: We cannot delete the .udl files, and instead store connection details in the registry by using user data source names as the connection details change regularly.

第4题:

You are the administrator of a SQL Server 2000 computer. The server contains a database that stores financial data. You want to use Data Transformation Services packages to import numeric data from other SQL server computers. The precision and scale values of this data are not defined consistently on the other servers.

You want to prevent any loss of data during the import operations. What should you do?

A.Use the ALTER COLUMN clause of the ALTER TABLE statement to change data types in the source tables. Change the data types so that they will use the lowest precision and scale values of the data that will be transferred.

B.Use the ALTER COLUMN clause of the ALTER TABLE statement to change data types in the destination tables. Change the data types to reflect the highest precision and scale values involved in data transfer.

C.Set a flag on each DTS transformation to require an exact match between source and destination columns.

D.Set the maximum error count for each DTS transformation task equal to the number of rows of data you are importing. Use an exception file to store any rows of data that generate errors.

E.Write Microsoft ActiveX script. for each DTS transformation. Use the script. to recast data types to the destinations precision and scale values.


正确答案:B
解析:Explanation: The ALTER COLUMN clause of the ALTER TABLE statement can be used to change the definition of a column and can be used to alter the precision and scale values of the data types. The destination precision should be changed so no data would be lost. The transformation to a data type with higher precision is automatic and would not require any coding.

Note: The precision of the data type refers to the number of digits in a number while the scale is the number of digits to the right of the decimal point in a number. Thus the number 702.85 has a precision of 5 and a scale of 2. The default maximum precision of numeric and decimal data types is 38.

Incorrect Answers:
A: The ALTER COLUMN clause of the ALTER TABLE statement can be used to change the definition of a column and can be used to alter the precision and scale values of the data types. However, we want to prevent any loss of data therefore we need to ensure that the data being imported correlates with the definition of the destination column. If it does not, any constraint that might exist on the destination column will prevent the data from being inserted.

C: Setting DTS transformation to require an exact match between source and destination columns refers to the data in the columns.

D: When the a maximum error count value for a DTS transformation task specifies the sum of row-level errors detected by the Transform. Data task and batch failures. When the Max error count value is exceeded, DTS task execution is terminated. Because rows containing errors detected by the DTS transformation task are discarded before batch submission, these errors do not trigger nor count as batch failures. Errors caught at the destination will fail the batch and add one to the error count regardless of how many rows are in the batch.

E: Recasting data types to the destinations precision could result in loss of data. The destination precision should be changed so no data would be lost.

Note: The capabilities of a Data Transformation Service package can be extended by using
Microsoft ActiveX scripts that implement the objects, properties, methods, and collections of the DTS object model. With ActiveX scripts the data can be formatted and transformed as it is copied from its source to the destination location.

An ActiveX script. transformation applies to tasks that work on the source data on a row-by-row basis and can be used to replace a two-digit state code in the source data with the legal abbreviation of the state in the destination data; set columns to a default of spaces, validate important columns in the source data and skip records that contain invalid data to prevent them from being copied to the destination, and alter the precision and scale values of data as the data copied from the source to the destination.

第5题:

is the 4th layer of the OSI reference model responsible for reliable network communication between end nodes.

A.Data link layer

B.Session layer

C.Transport layer

D.Application layer


正确答案:C
解析:四个选项分别是数据链路层、会话层、传输层和应用层。其中传输层位于OSI七层参考模型中的第四层,其功能之一是为会话层实体提供透明、可靠的数据传输服务。

第6题:

USER_DATA is a nonencrypted tablespace that contains a set of tables with data. You want to convert all existing data in the USER_DATA tablespace and the new data into the encrypted format.Which methodswould you use to achieve this?()

A. Use Data Pump to transfer the existing data to a new encrypted tablespace

B. Use ALTER TABLE MOVE to transfer the existing data to a new encrypted tablespace

C. Use CREATE TABLE AS SELECT to transfer the existing data to a new encrypted tablespace

D. Enable row movement for each table to be encrypted and then use ALTER TABLESPACE to encrypt the tablespace

E. Encrypt the USER_DATA tablespace using the ALTER TABLESPACE statement so that all the data in the tablespace is automatically encrypted


参考答案:A, B, C

第7题:

The "main storage" normally means that part of internal storage into which instructions and other data must be loaded for subsequent execution or processing. In large computing systems, the term "main storage" is(71) to "memory". "Buffer" mainly indicates a special-purpose storage or storage area allowing, through(72) storage, the data transfer between two functional units having different transfer characteristics. A buffer storage is used between non-synchronized devices or where one is(73) and the other is parallel or between those having different trans far rates. "(74) (memory)" is also a special-purpose buffer storage, smaller and faster than main storage, used to hold a copy of instructions and data obtained from main storage and likely to be needed next by the processor. "Register" is commonly composed of a part of internal storage having a specified storage(75) and usually intended for a specific purpose.

A.suitable

B.optional

C.choice

D.preferred


正确答案:D

第8题:

In low-speed network,it is usually adequate to wait for congestion to occur and then react to it bytelling the source of packets to slow down.In high-speed networks,this approach often works poorly,because in the(71) between sending the notification and notification arriving at the source,thousands of additional(72) may arrive.In ATM network,a major tool for preventing(73)is(74)control.When a host wants a new virtual(75),it must describe the traffic to be offeredand the service expected.

(69)

A.interval

B.time

C.slot

D.delay


正确答案:A

第9题:

In low - speed network ,it is usually adequate to wait for congestion to occur and then react to it by telling the source of packets to slow down. In high - speed networks, this approach often works poorly, because in the(71)between sending the notification and notification arriving at the source, thousands of additional(72)may arrive. In ATM network , a major tool for preventing(73)is(74)control. When a host wants a new virtual(75),it must describe the traffic to be offered and the service expected.

A.interval

B.time

C.slot

D.delay


正确答案:A
解析:interval:时间间隔

第10题:

Data transfer is slow between the source and destination. The quality of service requested by the transport layer in the OSI reference model is not being maintained. To fix this issue, at which layer should the troubleshooting process begin?()

A. presentation

B. session

C. transport

D. network

E. physical


参考答案:D

更多相关问题