网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Two database users, Jack and Bill, are accessing the SupportCenter STAFF table of the SupportCenter DB database. When Jack modifies a value in the table, the new value is invisible to Bill. Which is the modified value invisible to Bill?()

  • A、The modified data are not available on disk.
  • B、The modified data have been flushed out from memory.
  • C、The modified rows of the SupportCenter STAFF table have been locked.
  • D、Jack has not committed the changes after modifying the value.
  • E、Both users are accessing the database from two different machines.

参考答案

更多 “Two database users, Jack and Bill, are accessing the SupportCenter STAFF table of the SupportCenter DB database. When Jack modifies a value in the table, the new value is invisible to Bill. Which is the modified value invisible to Bill?()A、The modified data are not available on disk.B、The modified data have been flushed out from memory.C、The modified rows of the SupportCenter STAFF table have been locked.D、Jack has not committed the changes after modifying the value.E、Both users are accessing the database from two different machines.” 相关考题
考题 When() a documentary bill, our bank buys the bill and the documents for the face value less discount.A、we negotiatingB、negotiatedC、negotiatingD、we are negotiating

考题 You are investigating the performance of the server and see the following information: Events_waits_summary_global_by_event_name in the performance schema shows that the wait/synch/mutex/sql/LOCK_table_cache event is dominating other wait events. The table_open_cache_overflows status variable is 0.Which action should be taken to remove the performance bottleneck described here?()A.Increase the value of table_definition_cacheB.Increase the value of table_open_cache_instancesC.Decrease the value of table_open_cache_instancesD.Increase the value of table_open_cacheE.Decrease the value of table_definition_cacheF.Decrease the value of table_open_cache

考题 You have altered a non-unique index to be invisible to determine if queries execute within an acceptable response time without using this index.Which two are possible if table updates are performed which affect the invisible index columns?()A. The index remains invisible.B. The index is not updated by the DML statements on the indexed table.C. The index automatically becomes visible in order to have it updated by DML on the table.D. The index becomes unusable but the table is updated by the DML.E. The index is updated by the DML on the table.

考题 Higher compensation may be claimed only when,with the consent of the carrier,the value of the goods declared by the shipper which ______ the limits laid down in this clause has been stated in this bill of lading.A.increasesB.exceedsC.decreasesD.reduces

考题 In which two ways can you influence how downstream LSRs treat MPLS traffic?()A、Use an EXP rewrite table.B、Use a DSCP rewrite table.C、Statically assign a CoS value to an LDP-signaled LSPD、Statically assign a CoS value to an RSVP-signlated LSP

考题 Two database users, Jack and Bill, are accessing the Certkiller STAFF table of the Certkiller DB database. When Jack modifies a value in the table, the new value is invisible to Bill.  Which is the modified value invisible to Bill?()A、The modified data are not available on disk.B、The modified data have been flushed out from memory.C、The modified rows of the Certkiller STAFF table have been locked.D、Jack has not committed the changes after modifying the value.E、Both users are accessing the database from two different machines.

考题 You want to create a temporary table named OLD_INVENTORY in the OLD_INVENTORY database on the master server. This table is not to be replicated to the slave server. Which two changes would ensure that the temporary table does not propagate to the slave?()A、Use the – replicate-do-db, — replicate-do-table, or – replicate-wild-do-table option with the value equal to OLD_INVENTORYB、Change the binlog_format option to ROW and restart mysqld before you create the OLD_INVENTORY tableC、Stop SQL_THREAD on the slave until you have finished using the OLD_INVENTORY temporary tableD、Set binlog_format=MIXED with the – replicate-ignore-temp-table optionE、Use the – replicate-ignore-table option with the value equal to OLD_INENTORY.OLD_INVENTORY and restart mysqld before creating the temporary table

考题 You are planning to import customer data from the Customer table and the Country table in your SQL Server 2000 database into a SQL Server 2005 database. You want to ensure that during the import process,each value in the CountryCode column of the Customer table has a corresponding record in the CountryCode column in the Country table of the SQL Server 2005 database. You define a foreign key between these two tables. Thus,referential integrity will guarantee that the import routine fails if there are any records where a CountryCode value does not exist in the Country table but does exist in the Customer table. You need to ensure that the import process does not fail if records are encountered that do not exist in the Country table. What should you do?()A、Drop the foreign key. Import the data by using the script. Re-create the foreign key.B、Create a CHECK constraint.C、Create a DML INSTEAD OF trigger that writes the failed records to a file or table.D、Create a DML AFTER trigger that writes the failed records to a file or table.

考题 In which two ways can you influence how downstream LSRs treat MPLS traffic?()A、Use an EXP rewrite table.B、Use a DSCP rewrite table.C、Statically assign a CoS value to an LDP-signaled LSP.D、Statically assign a CoS value to an RSVP-signaled LSP.

考题 You have a range-partitioned table in your database. Each partition in the table contains the sales data for a quarter.  The partition related to the current quarter is modified frequently and other partitions undergo fewer data manipulations. The preferences for the table are set to their default values. You collect statistics for the table using the following command in regular intervals: SQL EXECUTE  DBMS_STATS.GATHER_TABLE_STATS(’SH’,’SALES’,GRANULARITY=’GLOBAL’);   You need statistics to be collected more quickly.  What can you do to achieve this?()A、 Set DYNAMIC_SAMPLING to level 4B、 Set the STATISTICS_LEVEL parameter to BASICC、 Set the INCREMENTAL value to TRUE for the partition tableD、 Increase the value of STALE_PERCENT for the partition table

考题 Identify the two situations in which you use the alert log file in your database to check the details.()A、Running a query on a table returns "ORA-600: Internal Error."B、Inserting a value in a table returns "ORA-01722: invalid number."C、Creating a table returns "ORA-00955: name is already used by an existing object."D、Inserting a value in a table returns "ORA-00001: unique constraint (SYS.PK_TECHP) violated." E、Inserting a row in a table returns "ORA-00060: deadlock detected while waiting for resource."

考题 You work as a database administrator for Supportcenter.cn. One of the database users accidentally deleted all the rows of a critical table and committed the delete at 1:30 p.m. You senior database administrator, SupportCenter, asks you to retrieve the lost data. Which two actions would you use to ensure that there is no impact on other connected users while retrieving the deleted rows?()A、Use a flashback query to retrieve the rows that were deletedB、Useconventialincremental export and then import the affected objectC、Shutdown the database inNORMALmode and restart the database instanceD、Use DBMS_META package to reconstruct the object using undo segmentsE、UseTablespacePoint in Time Recovery (TSPITR) method to recover the table and the dataF、Use Oracle DataPumptwithflashback_timeoption toentableflashback export and then import the affected object.

考题 In which scenario will you create a sorted hash cluster? ()A、 if the application uses queries joining tables only occasionallyB、 if the full table scan is executed often on only one table of the clustered tablesC、 if the data for all the rows of a cluster key value exceeds one or two Oracle blocksD、 when you want the data to be returned automatically in the chronological order

考题 You work as a database administrator for Supportcenter.cn. In a production environment, users complain about the slow response time when accessing the database. You have not optimized the memory usage of the Oracle instance and you suspect the problem to be with the memory. To which type of object would you refer to determine the cause of the slow response?()A、The trace fileB、The fixed viewsC、The data dictionary viewsD、The operating system log fieldsE、The dynamic performance views.

考题 You work as a database administrator for Certkiller .com. While loading data into the Certkiller STAFF table using Oracle Enterprise Manager 10g Database Control, you find the status of the job as failed. On further investigation, you find the following error message in the output log: ORA-01653 unable to extend table HR. Certkiller STAFF by 8 intablespaceUSERS Which task would you perform to load the data successfully without affecting the users who are accessing the table?()A、Restart the database instance and run the jobB、Truncate the Certkiller STAFF table and run the jobC、Delete all rows from the Certkiller STAFF table and run the jobD、Increase the size of the USERStablespacethe and run the jobE、Increase the size of the database default permanenttablespaceand run the job

考题 You are investigating the performance of the server and see the following information: Events_waits_summary_global_by_event_name in the performance schema shows that the wait/synch/mutex/sql/LOCK_table_cache event is dominating other wait events. The table_open_cache_overflows status variable is 0. Which action should be taken to remove the performance bottleneck described here?()A、Increase the value of table_definition_cacheB、Increase the value of table_open_cache_instancesC、Decrease the value of table_open_cache_instancesD、Increase the value of table_open_cacheE、Decrease the value of table_definition_cacheF、Decrease the value of table_open_cache

考题 In your Supportcenter.cn production database,you find that the database users are able to create and read files with unstructured data,available in any location on the host machine from an application. You want to restrict the database users to access files in a specific location on the host machine. What could do to achieve this?()A、Modify the value for the UTL_FILE_DIR parameter in the parameter fileB、Grant read and write privilege on the operating system path to the database usersC、Modify the value for the LDAP_DIRECTORY_ACCESS parameter in the parameter fileD、Modify the value for the PLSQL_NATIVE_LIBRARY_DIR parameter in the parameter fileE、Create a directory object referring to the operating system path, and grant read and write privilege on the directory object to the database users

考题 A table was just created on your Oracle database with six extents allocated to it. Which of the following factors most likely caused the table to have so many extents allocated?()A、The value for MINEXTENTS setting B、The value for PCTINCREASE setting C、The value for MAXEXTENTS setting D、By default, Oracle allocates six extents to all database objects

考题 You are building two forms. Each form has a button and a non-base table field. When the button is pressed, a complicated calculation is executed. The calculation is the same for both forms. The calculation code does not query or change the data in the database. When the calculation completes, it returns a single value to the non-base table field. To optimize performance and maintainability, which PL/SQL structure should be used? ()A、A trigger in each form. B、A subprogram in each form. C、A stored subprogram in the database. D、A subprogram in a library that is attached to each form.

考题 You have altered a non-unique index to be invisible to determine if queries execute within an acceptable response time without using this index. Which two are possible if table updates are performed which affect the invisible index columns?()A、The index remains invisible.B、The index is not updated by the DML statements on the indexed table.C、The index automatically becomes visible in order to have it updated by DML on the table.D、The index becomes unusable but the table is updated by the DML.E、The index is updated by the DML on the table.

考题 You are responsible for managing the database schema for an order entry application in a SQL Server 2005 database. After a design review, a member of the development staff asks you to add a new column named CommissionRate to the Product table. Because the actual commission rates for all products are not known at this time, each product has a default commission rate of 12 percent. The rate can be modified as necessary. You add the new column. You need to configure the table to assign the default value as efficiently as possible. What should you do?()A、 Create an INSERT trigger to assign the default value to each item in the table. B、 Create a CHECK constraint to validate the data and to assign the default value to each item in the table. C、 Create an UPDATE trigger to update the default value for each new item in the table. D、 Create a DEFAULT constraint to assign the default value specifying the WITH VALUES argument.

考题 You are modifying a table named Product in a SQL Server 2005 database. You want to add a new column named FriendlyName to the Product table. A friendly name for each product will be stored in this column. The table currently contains data. The sales department has not yet created a friendly name for each product. FriendlyName is a required value for each product. You want to add this new column by using the least amount of effort. What should you do?()A、Define the new column as NULL.Update the FriendlyName column to the same value as the productName column. Alter the FriendlyName column to be NOT NULL.B、Define the new column as NOT NULL with a default value of ’Undefined.’C、Define the new column as NULL. Use application logic to enforce the data constraint.D、Define the new column as NULL with a default value of ’Undefined.’

考题 单选题Two database users, Jack and Bill, are accessing the Certkiller STAFF table of the Certkiller DB database. When Jack modifies a value in the table, the new value is invisible to Bill.  Which is the modified value invisible to Bill?()A The modified data are not available on disk.B The modified data have been flushed out from memory.C The modified rows of the Certkiller STAFF table have been locked.D Jack has not committed the changes after modifying the value.E Both users are accessing the database from two different machines.

考题 多选题You work as a database administrator for Supportcenter.cn. One of the database users accidentally deleted all the rows of a critical table and committed the delete at 1:30 p.m. You senior database administrator, SupportCenter, asks you to retrieve the lost data. Which two actions would you use to ensure that there is no impact on other connected users while retrieving the deleted rows?()AUse a flashback query to retrieve the rows that were deletedBUseconventialincremental export and then import the affected objectCShutdown the database inNORMALmode and restart the database instanceDUse DBMS_META package to reconstruct the object using undo segmentsEUseTablespacePoint in Time Recovery (TSPITR) method to recover the table and the dataFUse Oracle DataPumptwithflashback_timeoption toentableflashback export and then import the affected object.

考题 单选题A table was just created on your Oracle database with six extents allocated to it. Which of the following factors most likely caused the table to have so many extents allocated?()A The value for MINEXTENTS setting B The value for PCTINCREASE setting C The value for MAXEXTENTS setting D By default, Oracle allocates six extents to all database objects

考题 单选题You are building two forms. Each form has a button and a non-base table field. When the button is pressed, a complicated calculation is executed. The calculation is the same for both forms. The calculation code does not query or change the data in the database. When the calculation completes, it returns a single value to the non-base table field. To optimize performance and maintainability, which PL/SQL structure should be used? ()A A trigger in each form. B A subprogram in each form. C A stored subprogram in the database. D A subprogram in a library that is attached to each form.

考题 单选题Two database users, Jack and Bill, are accessing the SupportCenter STAFF table of the SupportCenter DB database. When Jack modifies a value in the table, the new value is invisible to Bill. Which is the modified value invisible to Bill?()A The modified data are not available on disk.B The modified data have been flushed out from memory.C The modified rows of the SupportCenter STAFF table have been locked.D Jack has not committed the changes after modifying the value.E Both users are accessing the database from two different machines.