网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to perform certain data manipulation operations through a view called EMP_DEPT_VU, which you previously created. You want to look at the definition of the view (the SELECT statement on which the view was create.) How do you obtain the definition of the view?()
A

Use the DESCRIBE command in the EMP_DEPT VU view.

B

Use the DEFINE VIEW command on the EMP_DEPT VU view.

C

Use the DESCRIBE VIEW command on the EMP_DEPT VU view.

D

Query the USER_VIEWS data dictionary view to search for the EMP_DEPT_VU view.

E

Query the USER_SOURCE data dictionary view to search for the EMP_DEPT_VU view.

F

Query the USER_OBJECTS data dictionary view to search for the EMP_DEPT_VU view.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to perform certain data manipulation operations through a view called EMP_DEPT_VU, which you previously created. You want to look at the definition of the view (the SELECT statement on which the view was create.) How do you obtain the definition of the view?()A Use the DESCRIBE command in the EMP_DEPT VU view.B Use the DEFINE VIEW command on the EMP_DEPT VU view.C Use the DESCRIBE VIEW command on the EMP_DEPT VU view.D Query the USER_VIEWS data dictionary view to search for the EMP_DEPT_VU view.E Query the USER_SOURCE data dictionary view to search for the EMP_DEPT_VU view.F Query the USER_OBJECTS data dictionary view to search for the EMP_DEPT_VU view.” 相关考题
考题 You need to perform a block media recovery on the tools01.dbf data file in the SALES database by using Recovery Manager (RMAN).Which two are the prerequisites to perform this operation?() A. You must configure block change tracking fileB. You must have first level 1 backups for RMAN to restore blocksC. You must ensure that the SALES database is mounted or openD. You must have full or level 0 backups for RMAN to restore blocksE. You must take the tools01.dbf data file offline before you start a block media recovery

考题 You want to perform the following operations for the DATA ASM disk group:Which command accomplishes these tasks?() A. ALTER DISKGROUP data CHECK;B. ALTER DISKGROUP data CHECK DISK;C. ALTER DISKGROUP data CHECK FILE;D. ALTER DISKGROUP data CHECK DISK IN FAILURE GROUP 1;

考题 You added a PHONE_NUMBER column of NUMBER data type to an existing EMPLOYEES table. The EMPLOYEES table already contains records of 100 employees. Now, you want to enter the phone numbers of each of the 100 employees into the table. Some of the employees may not have a phone number available. Which data manipulation operation do you perform? ()A. MERGEB. INSERTC. UPDATED. ADDE. ENTERF. You cannot enter the phone numbers for the existing employee records.

考题 Which two client requests are captured during database replay Capture?()A、Flashback queriesB、Shared server requestsC、Login and logoff activities of sessionsD、Direct path load of data from external files by using utilities such as SQL *loaderE、Data definition language (DDL) and data manipulation language (DML) operations

考题 Which of the following statements is NOT true about RMAN?()A、It improves usability by enabling you to reuse the scripts to perform recovery operations.B、It detects block corruption while restoration and recovery operations.C、It enables you to perform block media recovery.D、It is capable to recover through unrecoverable operations, with only full database backups.

考题 You added a PHONE_NUMBER column of NUMBER data type to an existing EMPLOYEES table. The EMPLOYEES table already contains records of 100 employees. Now, you want to enter the phone numbers of each of the 100 employees into the table. Some of the employees may not have a phone number available. Which data manipulation operation do you perform?()A、MERGEB、INSERTC、UPDATED、ADDE、ENTERF、You cannot enter the phone numbers for the existing employee records.

考题 Server1 contains a folder named D:/Salesdata, which contains important company data. The hardware-monitoring software reports that the disk that contains volume D is in danger of imminent disk failure. You order a replacement disk, but you must wait at least one day for the disk to be delivered. You discover that you do not have a backup of the D:/Salesdata folder because a recent backup was configured incorrectly. You need to back up the D:/Salesdata folder so that you can restore the data if the disk fails. You need to achieve this goal as quickly as possible. What should you do? ()A、Perform a normal backup of the D:/Salesdata folder.B、Perform an incremental backup of the D:/Salesdata folder.C、Perform a differential backup of the D:/Salesdata folder.D、Perform a daily backup of the D:/Salesdata folder.E、Enable Shadow Copies on volume D:/Configure the shadow copy location as C:/.

考题 You need to perform certain data manipulation operations through a view called EMP_DEPT_VU, which you previously created. You want to look at the definition of the view (the SELECT statement on which the view was create.) How do you obtain the definition of the view? ()A、Use the DESCRIBE command in the EMP_DEPT VU view.B、Use the DEFINE VIEW command on the EMP_DEPT VU view.C、Use the DESCRIBE VIEW command on the EMP_DEPT VU view.D、Query the USER_VIEWS data dictionary view to search for the EMP_DEPT_VU view.E、Query the USER_SOURCE data dictionary view to search for the EMP_DEPT_VU view.F、Query the USER_OBJECTS data dictionary view to search for the EMP_DEPT_VU view.

考题 You need to perform a block media recovery on the tools01.dbf data file in the SALES database by using Recovery Manager (RMAN). Which two are the prerequisites to perform this operation? ()(Choose two)A、You must configure block change tracking fileB、You must have first level 1 backups for RMAN to restore blocksC、You must ensure that the SALES database is mounted or openD、You must have full or level 0 backups for RMAN to restore blocksE、You must take the tools01.dbf data file offline before you start a block media recovery

考题 You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()A、by using triggersB、by using external tablesC、by using anonymous PL/SQL blocksD、by auditing all DML operations on the table

考题 In your database, all the tablespaces are locally managed. You started Recovery Manager (RMAN) using recovery catalog and restored the control file by using the following command: RMAN RESTORE CONTROLFILE;  Which two operations do you need to perform after restoring the control file from backup?()A、shut down and restart the instanceB、add new tempfiles to the temporary tablespaces after recoveryC、perform a media recovery and open the database with the RESETLOGS optionD、perform a media recovery and bring the database to NOARCHIVELOG mode

考题 You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()A、by using triggersB、by using Data PumpC、by using external tablesD、by using anonymous PL/SQL blocks

考题 You are using Oracle Database 10g. Which statement regarding an incomplete recovery is true?()A、 You do not need to restore all the data files.B、 You do not need to open the database with the RESETLOGS operationC、 You do not need to perform a full backup after the RESETLOGS operation.D、 You do not need to recover all the data files to the same system change number (SCN).

考题 You need to recommend a process for monitoring the servers. The process must meet the  company’s technical requirements.    What should you include in the recommendation?()A、event subscriptionsB、Data Collector Sets (DCSs)C、Resource MonitorD、Microsoft System Center Operations Manager

考题 You are the administrator of the TestKing company network. The network consists of a single Active Directory domain named The network includes 20 member servers running Windows Server 2003 and 4 domain controllers running Windows Server 2003. All client computers run Windows XP Professional. A member server named TestKingSrvA functions as a file server. TestKingSrvA has a locally attached tape device. You need to create a backup schedule for TestKingSrvA. All data on TestKingSrvA must be backed up once a week. Every day, you need to back up only the data that was changed after the last weekly backup. You need to minimize the amount of time taken to restore the data in the event of a hardware failure. What should you do? ()(Choose two)()A、Perform a normal backup every week.B、Perform a copy backup every week.C、Perform a differential backup every week.D、Perform an incremental backup every weekE、Perform a normal backup every day.F、Perform a copy backup every day.G、Perform a differential backup every day.H、Perform an incremental backup every day.

考题 You are the administrator of an Active Directory domain named A user reports that he cannot log on to a Windows Server 2003 computer that contains a critical application. You discover that the organizational unit (OU) in which the server is located was deleted. You discover that the user rights for this server are controlled by Group Policy. You need to restore access to the server. You need to achieve this goal by using the minimum amount of administrative effort. What should you do?()A、Perform a normal restoration of the System State data for the domain controller. Force replication.B、Perform an authoritative restoration of the System State data for the domain controller. Mark the OU for replication.C、Re-create the OU that was deleted. Reapply Group Policy, and then add the computer account and any necessary users or groups.D、Perform an Automated System Recovery (ASR) restoration on the domain controller.

考题 You work as the application developer at Certkiller .com. Certkiller .com uses Visual Studio.NET 2005 as its application development platform.You are developing a .NET Framework 2.0 application used to store a type-safe list of names and e-mail addresses. The list will be populated all at ones from the sorted data which means you well not always need to perform insertion or deletion operations on the data. You are required to choose a data structure that optimizes memory use and has good performance.What should you do?()A、 The System.Collections.Generic.SortedList class should be usedB、 The System.Collections.HashTable class should be usedC、 The System.Collections.Generic.SortedDictionary class should be usedD、 The System.Collections.SortedList class should be used

考题 单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()A by using triggersB by using Data PumpC by using external tablesD by using anonymous PL/SQL blocks

考题 单选题You need to rename a data file of a tablespace. How would you perform this?()A AB BC CD D

考题 单选题You need to create a data block for DML operations in the NEW_EMPLOYEE form module. Which data source can you use for this block?()A REF cursor query. B Stored function. C From clause query. D Transactional trigger.

考题 单选题You work as an application developer at CER-Tech.com. Cert-Tech.com uses Visual studio.NET 2005 as its Application Development platform.You are developing a .NET Framework 2.0 application used to store a type-safe list of names and e-mail addresses. The list will be populated all at ones from the sorted data which means you will not always need to perform insertion or deletion operations on the data. You are required to choose a data structure that optimizes memory use and has good performance.What should you do?()A  The System.Collections.Generic.SortedList class should be used B  The System.Collections.HashTable class should be usedC  The System.Collections.Generic.SortedDictionary class should be used D  The System.Collections.SortedList class should be used

考题 单选题In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information.  Whataction would you take to achieve this task()A Apply fine-grained auditing.B Implement value-based auditing.C Impose standard database auditing to audit object privileges.D Impose standard database auditing to audit SQL statements.

考题 多选题ou need to create a data block for query operations in the RETIRED_EMPLOYEES form module. Which three data sources can you use for this block?()AvectorBdatabase viewCdatabase tableDtransactional triggerEPL/SQL table of recordsFmulti-dimensional array

考题 单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()A by using triggersB by using external tablesC by using anonymous PL/SQL blocksD by auditing all DML operations on the table

考题 多选题Examine the query and its output executed In an RDBMS Instance:Which three statements are true about the users (other than sys) in the output?()AThe C # # B_ADMIN user can perform all backup and recovery operations using RMAN only.BThe C # # C_ADMIN user can perform the data guard operation with Data Guard Broker.CThe C # # A_ADMIN user can perform wallet operations.DThe C # # D_ADMIN user can perform backup and recovery operations for Automatic Storage Management (ASM).EThe C # # B_ADMIN user can perform all backup and recovery operations using RMAN or SQL* Plus.

考题 单选题You are using Oracle Database 10g. Which statement regarding an incomplete recovery is true?()A  You do not need to restore all the data files.B  You do not need to open the database with the RESETLOGS operationC  You do not need to perform a full backup after the RESETLOGS operation.D  You do not need to recover all the data files to the same system change number (SCN).

考题 单选题You added a PHONE_NUMBER column of NUMBER data type to an existing EMPLOYEES table. The EMPLOYEES table already contains records of 100 employees. Now, you want to enter the phone numbers of each of the 100 employees into the table. Some of the employees may not have a phone number available. Which data manipulation operation do you perform?()A MERGEB INSERTC UPDATED ADDE ENTERF You cannot enter the phone numbers for the existing employee records.

考题 单选题You need to perform certain data manipulation operations through a view called EMP_DEPT_VU, which you previously created. You want to look at the definition of the view (the SELECT statement on which the view was created.) How do you obtain the definition of the view?()A Use the DESCRIBE command on the EMP_DEPT_VU view.B Use the DEFINE VIEW command on the EMP_DEPT_VU view.C Use the DESCRIBE VIEW command on the EMP_DEPT_VU view.D Query the USER_VIEWS data dictionary view to search for the EMP_DEPT_VU view.E Query the USER_SOURCE data dictionary view to search for the EMP_DEPT_VU view.F Query the USER_OBJECTS data dictionary view to search for the EMP_DEPT_VU view.