网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Examine the following command: CREATE TABLE (prod_id number(4), Prod_name varchar2 (20), Category_id number(30), Quantity_on_hand number (3) INVISIBLE); Which three statements are true about using an invisible column in the PRODUCTS table?()

  • A、The %ROWTYPE attribute declarations in PL/SQL to access a row will not display the invisible column in the output.
  • B、The DESCRIBE commands in SQL *Plus will not display the invisible column in the output.
  • C、Referential integrity constraint cannot be set on the invisible column.
  • D、The invisible column cannot be made visible and can only be marked as unused.
  • E、A primary key constraint can be added on the invisible column.

参考答案

更多 “ Examine the following command: CREATE TABLE (prod_id number(4), Prod_name varchar2 (20), Category_id number(30), Quantity_on_hand number (3) INVISIBLE); Which three statements are true about using an invisible column in the PRODUCTS table?()A、The %ROWTYPE attribute declarations in PL/SQL to access a row will not display the invisible column in the output.B、The DESCRIBE commands in SQL *Plus will not display the invisible column in the output.C、Referential integrity constraint cannot be set on the invisible column.D、The invisible column cannot be made visible and can only be marked as unused.E、A primary key constraint can be added on the invisible column.” 相关考题
考题 Examine the following RMAN command:RMAN CONFIGURE ENCRYPTION FOR DATABASE ON;RMAN BACKUP DATABASE PLUS ARCHIVELOG;Which prerequisite must be met before accomplishing the backup?() A. Provide a password for the encryptionB. Set up an Oracle wallet for the encryptionC. No setup is required as it is a default encryption methodD. Both Oracle wallet and password must be set up for the encryption

考题 View the Exhibit and examine the output.You execute the following RMAN command to perform the backup operation:What is the multiplexing level in the preceding backup process() A. 4B. 8C. 7D. 0

考题 Examine the output of the query that you executed to list the objects in the recycle bin:You verified that no table named SALES_TAB exists in the schema. Then you executed the following command to purge the objects in the recycle bin:SQL PURGE TABLE sales_tab;What would be the outcome of this command?()A. All three tables in the recycle bin are purgedB. Only the table with the oldest DROPSCN is purgedC. The command returns an error because multiple entries with the same name exist in the recycle binD. Only the table with the latest DROPSCN is purged

考题 View the Exhibit to examine the error during the database startup.You open an RMAN session for the database instance. To repair the failure, you executed the following as the first command in the RMAN session:RMAN REPAIR FAILURE;Which statement describes the consequence of the command?()A. The command performs the recovery and closes the failures.B. The command only displays the advice and the RMAN script required for repair.C. The command produces an error because the ADVISE FAILURE command has not been executed before the REPAIR FAILURE command.D. The command executes the RMAN script to repair the failure and removes the entry from the Automatic Diagnostic Repository (ADR).

考题 Your multitenant container database (CDB) is running in ARCHIVELOG mode. You connect to the CDB RMAN.Examine the following command and its output:You execute the following command:RMAN BACKUP DATABASE PLUS ARCHIVELOG;Which data files will be backed up?()A. Data files that belong to only the root containerB. Data files that belong to the root container and all the pluggable databases (PDBs)C. Data files that belong to only the root container and PDB$SEEDD. Data files that belong to the root container and all the PDBs excluding PDB$SEED

考题 After adding a new Ethernet card to a system and rebooting, the system administrator notices the card was not configured. How can the system administrator determine if there were errors during the configuration process for the card?()A、Examine the bootlog with the command: alog -o -f /var/adm/ras/bootlogB、Display the device attributes and errors with the command: lsdev -C -l ent0C、Examine the AIX errlog for configuration method errors with the command: errpt -a -C ent0D、Examine the ODM for configuration errors with the command: odmget -q "method_errors" ent0

考题 While applying a service update on a system using SMIT, the system administrates SMIT Command Status screen shows "Command: failed". Which of the following procedures should be performed to investigate the failure?()A、Exit the SMIT session and re-apply the update.B、Select the SMIT option to Clean UP After an Interrupted Installation.C、Examine the installation summary report to determine the cause of the failure.D、Examine the console log to view the error messages generated by the failure.

考题 Which of the following commands should Karen, a technician, use to examine and restoreprotected system files?()A、SFCB、RECOVERC、REPLACED、COPY

考题 tony would like to make it easier for users of the video application to enter new doc using the “video form”, he’d like users to be able to create new “video” doc form within the view. Which one of the following should tony so to build this interface?()A、create a view action that has the following formula:@command([create];”video”)B、create a form action that has the following formula:@command([compose];”video”)C、create a view action that has the following formula:@command([compose];”video”)D、create a database action that has the following formula:@command([compose];”video”)

考题 Examine the following RMAN command:   RMAN CONFIGURE ENCRYPTION FOR DATABASE ON; RMAN BACKUP DATABASE PLUS ARCHIVELOG;   Which prerequisite must be met before accomplishing the backup?()A、 Provide a password for the encryptionB、 Set up an Oracle wallet for the encryptionC、 No setup is required as it is a default encryption methodD、 Both Oracle wallet and password must be set up for the encryption

考题 单选题To examine the Exhibit, press the Exhibit button. Based on the output of the "netstat -p udp" command as shown in the exhibit, which of the following procedures should be performed?()A  Increase the number of nfsd's on the client. B  Increase the number of biod's on the client. C  Decrease the number of nfsd's on the server. D  Increase the size of nfs_socketsize on the server.

考题 多选题Examine the following command used to perform incremental level 0 backup: RMAN BACKUP INCREMENTAL LEVEL 0 DATABASE; To enable the block change tracking, after the incremental level 0 backup you issued the following command: SQL ALTER DATABASE ENABLE BLOCK CHANGE TRACKING USING FILE '/mydir/ rman_change_track.f'; To perform incremental level 1 cumulative backup, you issued the following command: RMAN BACKUP INCREMENTAL LEVEL 1 CUMULATIVE DATABASE; Which two statements are true in the above situation?()AThe block change tracking data will be used only from the next incremental 0 backup.BThe incremental backup will use change tracking data for accomplishing the backup.CThe incremental backup will not use change tracking data for accomplishing the backup.DThe block track file will scan all the blocks and create bitmap for all the blocks backed up in the level 0 backup.

考题 单选题Examine the following RMAN command: RMAN CONFIGURE ENCRYPTION FOR DATABASE ON; RMAN BACKUP DATABASE PLUS ARCHIVELOG; Which prerequisite must be met before accomplishing the backup?()A Provide a password for the encryptionB Set up an Oracle wallet for the encryptionC No setup is required as it is a default encryption methodD Both Oracle wallet and password must be set up for the encryption

考题 单选题View the Exhibit and examine the parameters. User A executes the following command to update the TRANS table: SQL UPDATE B.trans SET tr_amt=tr_amt+500 WHERE c_code=’C005’;  Before user A issues a COMMIT or ROLLBACK command, user B executes the following command onthe TRANS table:  SQL ALTER TABLE trans MODIFY (tr_type VARCHAR2(3));  What would happen in this scenario()A The ALTER TABLE command modifies the column successfully.B The DDL operation gets higher priority and transaction for user a is rolled back.C The ALTER TABLE command waits indefinitely until user a ends the transaction.D The ALTER TABLE command fails after waiting for 60 seconds due to the resource being busy.

考题 单选题View the Exhibit and examine the output. You execute the following RMAN command to perform the backup operation:   RMAN RUN { ALLOCATE CHANNEL c1 DEVICE TYPE disk MAXOPENFILES 8; BACKUP DATABASE FILESPERSET 4; }   What is the multiplexing level in the preceding backup process?()A  4B  8C  7D  0

考题 单选题Examine the following query output: You issue the following command to import tables into the hr schema: $ impdp hr/hr directory = dumpdir dumpfile = hr_new.dmp schemas=hr TRANSFORM=DISABLE_ARCHIVE_LOGGING: Y Which statement is true?()A All database operations performed by the impdp command are logged.B Only CREATE INDEX and CREATE TABLE statements generated by the import are logged.C Only CREATE TABLE and ALTER TABLE statements generated by the import are logged.D None of the operations against the master table used by Oracle Data Pump to coordinate its activities are logged.

考题 单选题Examine the following ALTER command: SQL ALTER DISKGROUP dgroup1 UNDROP DISKS; What is the purpose of the command?()A It cancels all pending disk drops within the disk groupB It restores disks that are being dropped as the result of a DROP DISKGROUP operationC It mounts disks in the disk group for which the drop-disk operation has already been completedD It restores all the dropped disks in the disk group for which the drop-disk operation has already been completedE It adds previously dropped disks back into the disk group

考题 单选题Your multitenant container database (CDB) is running in ARCHIVELOG mode. You connect to the CDB RMAN. Examine the following command and its output: You execute the following command: RMAN BACKUP DATABASE PLUS ARCHIVELOG; Which data files will be backed up?()A Data files that belong to only the root containerB Data files that belong to the root container and all the pluggable databases (PDBs)C Data files that belong to only the root container and PDB$SEEDD Data files that belong to the root container and all the PDBs excluding PDB$SEED

考题 单选题Examine the following command:   SQL ALTER TABLE booking SHRINK SPACE COMPACT;   Which activity is performed when the preceding command is executed?()A  The shrink operation touches every block in the BOOKING tableB  The high-water mark (HWM) for the BOOKING table is shifted from its original positionC  The progress of the shrink operation is saved in the bitmap blocks of the BOOKING tableD  The data manipulation language (DML) triggers on the BOOKING table are executed because the shrink operation is internally handled by the INSERT/DELETE operation

考题 单选题Examine the following command:   ALTER DISKGROUP data MOUNT FORCE;   In which scenario can you use the above command to mount the disk group?()A  when ASM disk goes offlineB  when one or more ASM files are droppedC  when some disks in a disk group are offlineD  when some disks in a failure group for a disk group are rebalancing

考题 单选题Examine the following command:ALTER SYSTEM SET enable_ddl_logging=FALSE;Which statement is true?()A None of the data definition language (DDL) statements are logged in the trace file.B Only DDL commands that resulted in errors are logged in the alert log file.C A new log.xml file that contains the DDL statements is created, and the DDL command details are removed from the alert log file.D Only DDL commands that resulted in the creation of new database files are logged.

考题 单选题Examine the following command: ALTER DISKGROUP data MOUNT FORCE; In which scenario can you use the above command to mount the disk group? ()A when ASM disk goes offlineB when one or more ASM files are droppedC when some disks in a disk group are offlineD when some disks in a failure group for a disk group are rebalancing