A data processing company is comparing the specifications of

题目
单选题
A data processing company is comparing the specifications of the SunFire 6800, SunFire 12k and the IBM pSeries 670 for a server consolidation project. Which of the following p670 capabilities would provide the most significant benefit for server consolidation?()
A

Maximum memory

B

Maximum processor speed

C

Maximum number of PCI slots

D

Maximum number of partitions

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Input data from keyboard are stored in(71) for processing.

A.modem

B.bus

C.memory

D.printer


正确答案:C

第2题:

Note: Make(67)regularly in data processing.

A.edit

B.insert

C.format

D.Backup


正确答案:D
解析:注意:在数据处理时要有规律地备份。

第3题:

●Note:Make (72) regularly in data processing.

(72) A.edit

B.insert

C.format

D.Back up


正确答案:D
【解析】在数据处理时要有规律地备份。

第4题:

() .is a term for data sets that are so large or complex that traditional data processing applications are inadequate Challenges include analysis, capture, data ?curation, search, sharing, storage,transfer,visualization, querying, updating and information privacy.

A.Data market'

B.Data warehouse

C.Big data

D.BI


正确答案:C

第5题:

( )is a trem for data sets that are so large or complex that traditional data processing applications are inadequate. Challenges include analysis, capture . data curation. Search. Sharing. Storage . transfer. Visualization . querying updating and information privacy

A.Data market

B.Data varehouse

C.Big data

D.BI


正确答案:C

第6题:

Is a programming model and an associated implementation for processing and generating big data sets with a parallel, distributed algorithm on a cluster.The model is a specialization of the split-apply-combine strategy for data analysis().

A.HDFS

B.Chukwa

C.MapReduce

D.HBase


正确答案:C

第7题:

method is the use of a data processing system to represent selected behavioral(67)of a physical or abstract system. For example, the representation of air streams around airfoils at various velocities, temperatures, and air pressures with such a system.Emulation method is slightly different, it uses a data processing system to imitate another data processing system, so that the imitating system accepts the same data, executes the same programs, and achieves the same(68) as the imitated system. Emulation is usually achieved(69) hardware or firmware. In a network, for example, microcomputers might emulate terminals(70) communicate with mainframe.

A.Assembly

B.Simultaneity

C.Fraud

D.Simulation


正确答案:D

第8题:

Is a massive volume of structured and unsteuctured data so large it is difficult to process using traditional database or software technique( ).

A.Data Processing system

B.Big Data

C.Data warehouse

D.DBMS


正确答案:B

第9题:

You are the administrator of a SQL Server 2000 computer. The server contains your company's order processing database. Two-hundred operators take orders by telephone 24 hours a day. Threehundred data entry personnel enter data from orders received by mail.

To ensure that order data will not be lost, your company's disaster recovery policy requires that backups be written to tape. Copies of these tapes must be stored at an off-site company location. Orders must be entered into the database before they can be filled. If the server fails, you must be able to recover the order data as quickly as possible.

You need to create a backup strategy that meets the company requirements and minimizes server workload. Which two actions should you take? (Each correct answer represents part of the solution. Choose two.)

A.Perform. a combination of full database and filegroup backups.

B.Perform. a combination of full database and file backups.

C.Perform. a combination of full database, differential, and transaction log backups.

D.Back up the data to a local tape drive.

E.Back up the data to a network share, and then use enterprise backup software to write the disk backups to tape.


正确答案:CE
解析:Explanation:
C: Most OLTP backup schemes include a full database, differential, and transaction log backups

E: In order to recover the data as quickly as possibly we backup the data to network share, and then backup that share to tape. This minimizes the impact of the backup process on the SQL Server computer.

Note 1: SQL Server 2000 provides three database recovery models. These are the Simple recovery model, the Full Recovery Model and the Bulk-Logged Recovery model. Simple Recovery requires the least administration. In the Simple Recovery model, data is recoverable only to the last full database or differential backup. Transaction log backups are not used, and consequently, minimal transaction log space is required.

This Recovery Model is not an appropriate choice for production systems where loss of recent changes is unacceptable. Full Recovery and Bulk-Logged Recovery models provide the greatest protection for data. These models rely on the transaction log to provide full recoverability and to prevent work loss in the broadest range of failure scenarios.

The Full Recovery model provides the most flexibility for recovering databases to an earlier point in time. The Bulk-Logged model provides higher performance and lower log space consumption for certain large-scale operations. It does this at the expense of some flexibility of pointin- time recovery. In this scenario we would want to implement the Full Recovery model as this Recovery model provides complete protection against media failure and provides the ability to recover the database to the point of failure or to a specific point in time.

To guarantee this degree of recoverability, all operations are fully logged. The backup strategy for full recovery consists of database backups, differential backups, which are optional, and transaction log backups. The differential backups are optional but have less of an effect on the system while they run, as they are smaller than full database backups.

This is because a differential backup creates a copy of all the pages in a database modified after the last database backup. A transaction log backup makes a copy only of the log file and backs up the changes made to the database after the last full or differential database backup. A log file backup cannot be used by itself to restore a database. A log file is used after a database restore to recover the database to the point of the original failure. The full database, differential, and transaction log backups can be written to a hard disk or other disk storage media such as a tape drive.

Disk backup devices can be defined on a local disk of a server or on a remote disk on a shared network resource. Tape backup devices are used in the same way as disk devices, with the exception that the tape device must be connected physically to the computer running an instance of SQL Server. SQL Server 2000 thus does not support backing up to remote tape devices.

Note 2, file backup, filegroup backup: SQL Server 2000 supports backing up or restoring individual files or filegroups within a database. This is a complex backup and the restore process that is usually reserved for large databases with high availability requirements. If the time available for backups is not long enough to support backing up the full database, subsets of the database can be backed up at different times. If a disk holding database files or filegroups fails, the site can restore just the lost files or filegroups. This allows for a quicker recovery because only the damaged files or filegroups are restored in the first step, not the entire database.

Incorrect Answers:
A: An OLTP server requires transaction log backups in order to be able to recover up to the point of failure.

B: An OLTP server requires transaction log backups in order to be able to recover up to the point of failure.

D: Backing up to a local tape device would minimize cost but it would compared to a backup to a network it would decrease performance of the server more, and it would take more time to recover.

第10题:

program propagates itself by modifying other programs to include a possibly changed copy of itself and that is executed when the infected program is(67). A virus often causes damage or annoyance and may be triggered by some event such as the occurrence of a predetermined date.Worm is a self-contained program that can propagate itself through data processing systems or computer networks. Worms are often designed by hackers to use up(68) resources such as storage space or processing time.Trojan horse implies by the name an apparently harmless program containing(69) logic that allows the unauthorized collection, falsification or destruction of data. Logic bomb causes damage to a data processing system when triggered by some specific system condition. Time bomb is also a malicious program being activated at a(70) time.

A.Worm

B.Virus

C.Disaster

D.Demon


正确答案:B

更多相关问题