Question
a.
Character
b.
Binary
c.
Delimited
d.
None of the mentioned
Posted under Hadoop
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. ________ text is appropriate for most non-binary data types.
Similar Questions
Discover Related MCQs
Q. If you set the inline LOB limit to ________ all large objects will be placed in external storage.
View solution
Q. ________ does not support the notion of enclosing characters that may include field delimiters in the enclosed string.
View solution
Q. Sqoop can also import the data into Hive by generating and executing a ____________ statement to define the data’s layout in Hive.
View solution
Q. The __________ tool imports a set of tables from an RDBMS to HDFS.
View solution
Q. Which of the following argument is not supported by import-all-tables tool?
View solution
Q. Apache Cassandra is a massively scalable open source _______ database.
View solution
Q. Cassandra uses a protocol called _______ to discover location and state information.
View solution
Q. A __________ determines which data centers and racks nodes belong to it.
View solution
Q. User accounts may be altered and dropped using the __________ Query Language.
View solution
Q. Authorization capabilities for Cassandra use the familiar _________ security paradigm to manage object permissions.
View solution
Q. Client-to-node encryption protects data in flight from client machines to a database cluster using ___________
View solution
Q. Using ___________ file means you don’t have to override the SSL_CERTFILE environmental variables every time.
View solution
Q. Internal authentication stores usernames and bcrypt-hashed passwords in the ____________ table.
View solution
Q. A _________ grants initial permissions, and subsequently a user may or may not be given the permission to grant/revoke permissions.
View solution
Q. __________ is one of many possible IAuthorizer implementations and the one that stores permissions in the system_auth.permissions table to support all authorization-related CQL statements.
View solution
Q. Cassandra creates a ___________ for each table, which allows you to symlink a table to a chosen physical drive or data volume.
View solution
Q. When ___________ contents exceed a configurable threshold, the memtable data, which includes indexes, is put in a queue to be flushed to disk.
View solution
Q. Data in the commit log is purged after its corresponding data in the memtable is flushed to an _________
View solution
Q. For each SSTable, Cassandra creates _________ index.
View solution
Q. Cassandra marks data to be deleted using _________
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Hadoop? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!