网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which two statements are true about the primary key constraint in a table? ()
A

It is not possible to disable the primary key constraint.

B

It is possible to have more than one primary key constraint in a single table.

C

The primary key constraint can be referred by only one foreign key constraint.

D

The primary key constraint can be imposed by combining more than one column.

E

The non-deferrable primary key constraint creates an unique index on the primary key column if it is not already indexed.


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which two statements are true about the primary key constraint in a table? ()AIt is not possible to disable the primary key constraint.BIt is possible to have more than one primary key constraint in a single table.CThe primary key constraint can be referred by only one foreign key constraint.DThe primary key constraint can be imposed by combining more than one column.EThe non-deferrable primary key constraint creates an unique index on the primary key column if it is not already indexed.” 相关考题
考题 Which of the following statements about testing software with data is (are) true?Ⅰ.The primary purpose of such testing is to find errors.Ⅱ.Such testing can demonstrate the existence of errors but cannot demonstrate the absence of errors.A.NeitherB.I onlyC.ⅡonlyD.Ⅰand Ⅱ

考题 The InnoDB engine has a feature known as clustered indexes.Which three statements are true about clustered indexes as used in InnoDB?() A.A primary key must exist for creation of a clustered indexB.A clustered index allows fulltext searching within InnoDBC.The first unique index is always used as a clustered index and not a primary keyD.A clustered index provides direct access to a page containing row dataE.If no indexes exist, a hidden clustered index is generated based on row IDsF.A primary key is used as a clustered indexG.A clustered index is a grouping of indexes from different tables into a global index for faster searching

考题 Examine the following commands for redefining a table with Virtual Private Database (VPD) policies:Which two statements are true about redefining the table?() A. All the triggers for the table are disabled without changing any of the column names or column types in the table.B. The primary key constraint on the EMPLOYEES table is disabled during redefinition.C. VPD policies are copied from the original table to the new table during online redefinition.D. You must copy the VPD policies manually from the original table to the new table during online redefinition.

考题 Which two statements regarding symmetric key encryption are true?() (Choose two.) A. The same key is used for encryption and decryption.B. It is commonly used to create digital certificate signatures.C. It uses two keys: one for encryption and a different key for decryption.D. An attacker can decrypt data if the attacker captures the key used for encryption.

考题 Which of following statements about testing software with data is (are) true?Ⅰ.The primary purpose of such testing is to find errors.Ⅱ.Such testing can demonstrate the existence of errors but can not demonstrate the absence of errors.A.NeitherB.Ⅰ onlyC.Ⅱ onlyD.Ⅰ and Ⅱ

考题 Which two statements about NTP version 4 are true?()A、It supports fast synchronization at starting and before network failuresB、It supports automatic server discoveryC、It uses a fixed-point arithmetionD、It supports the "nanokernel" kernel implementationE、It does not support Public-Key Cryptography

考题 Which of the following statements is TRUE about the primary system dump device?()A、 It is shared. B、 It must be /dev/hd6. C、 It must be an internal disk. D、 It can be an external device.

考题 Which two statements are true about L2TP tunnels?() (Choose two.)A、Traffic is clear textB、Traffic is encryptedC、They are initiated by the LNSD、They are initiated by the LAC

考题 Which two statements are true about the primary address on an interface?()A、It is the address used by default as the local address for broadcast and multicast packets sourced locally and sent out of the interfaceB、You use the primary address when you have multiple IP addresses belonging to the same subnet on the same interfaceC、It can be useful for selecting the local address used for packets sent out of unnumbered interfaces when multiple non-127 addresses are configured on the loopback interfaceD、By default, the primary address on an interface is selected as the numerically highest local address configured on the interface

考题 Which two statements regarding asymmetric key encryption are true?()A、The same key is used for encryption and decryption.B、It is commonly used to create digital certificate signatures.C、It uses two keys: one for encryption and a different key for decryption.D、An attacker can decrypt data if the attacker captures the key used for encryption

考题 Which two statements are true about precedence values in policy?() (Choose two.)A、1 is the default precedence.B、A lower number is preferred.C、A higher number is preferred.D、100 is the default precedence.

考题 Which two statements are true about the primary key constraint in a table? ()A、It is not possible to disable the primary key constraint.B、It is possible to have more than one primary key constraint in a single table.C、The primary key constraint can be referred by only one foreign key constraint.D、The primary key constraint can be imposed by combining more than one column.E、The non-deferrable primary key constraint creates an unique index on the primary key column if it is not already indexed.

考题 Which two statements are true about a bitmap index? ()A、It is recommended for the columns that have unique values.B、It can be converted to a B-tree index by using the ALTER INDEX command.C、It has a bitmap segment for each distinct value in the key column, containing a string of bits in which each bit represents the presence or absence of a key column value.D、Updating the key column locks the whole bitmap segment that contains the bit for the key value to be updated.

考题 You execute this command to drop the ITEM table, which has the primary key referred in the ORDERtable:  SQL DROP TABLE scott.item CASCADE CONSTRAINTS PURGE;  Which two statements are true about the effect of the command()A、No flashback is possible to bring back the ITEM table.B、The ORDER table is dropped along with the ITEM table.C、The dependent referential integrity constraints in the ORDER table are disabled.D、The dependent referential integrity constraints in the ORDER table are removed.E、The table definition of the ITEM table and associated indexes are placed in the recycle bin.

考题 Which two statements are true about encrypting RMAN backup?()A、 The transparent encryption of backups uses the encryption walletB、 The database uses the same encryption key for every encrypted backupC、 The password encryption of backups only uses the password while creating and restoring backupD、 If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups

考题 Which two statements are true about constraints? ()A、The UNIQUE constraint does not permit a null value for the column.B、A UNIQUE index gets created for columns with PRIMARY KEY and UNIQUE constraints.C、The PRIMARY KEY and FOREIGN KEY constraints create a UNIQUE index.D、The NOT NULL constraint ensures that null values are not permitted for the column.

考题 The InnoDB engine has a feature known as clustered indexes. Which three statements are true about clustered indexes as used in InnoDB?()A、A primary key must exist for creation of a clustered indexB、A clustered index allows fulltext searching within InnoDBC、The first unique index is always used as a clustered index and not a primary keyD、A clustered index provides direct access to a page containing row dataE、If no indexes exist, a hidden clustered index is generated based on row IDsF、A primary key is used as a clustered indexG、A clustered index is a grouping of indexes from different tables into a global index for faster searching

考题 Which two statements are true about encrypting RMAN backup?() (Choose two.)A、The transparent encryption of backups uses the encryption walletB、The database uses the same encryption key for every encrypted backupC、The password encryption of backups only uses the password while creating and restoring backupD、If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.

考题 多选题Which two statements are true about L2TP tunnels?() (Choose two.)ATraffic is clear textBTraffic is encryptedCThey are initiated by the LNSDThey are initiated by the LAC

考题 多选题The InnoDB engine has a feature known as clustered indexes. Which three statements are true about clustered indexes as used in InnoDB?()AA primary key must exist for creation of a clustered indexBA clustered index allows fulltext searching within InnoDBCThe first unique index is always used as a clustered index and not a primary keyDA clustered index provides direct access to a page containing row dataEIf no indexes exist, a hidden clustered index is generated based on row IDsFA primary key is used as a clustered indexGA clustered index is a grouping of indexes from different tables into a global index for faster searching

考题 多选题Which two statements regarding asymmetric key encryption are true?()AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption

考题 多选题Which two statements are true about a bitmap index? ()AIt is recommended for the columns that have unique values.BIt can be converted to a B-tree index by using the ALTER INDEX command.CIt has a bitmap segment for each distinct value in the key column, containing a string of bits in which each bit represents the presence or absence of a key column value.DUpdating the key column locks the whole bitmap segment that contains the bit for the key value to be updated.

考题 多选题Which two statements are true about constraints? ()AThe UNIQUE constraint does not permit a null value for the column.BA UNIQUE index gets created for columns with PRIMARY KEY and UNIQUE constraints.CThe PRIMARY KEY and FOREIGN KEY constraints create a UNIQUE index.DThe NOT NULL constraint ensures that null values are not permitted for the column.

考题 多选题You execute this command to drop the ITEM table, which has the primary key referred in the ORDERtable:  SQL DROP TABLE scott.item CASCADE CONSTRAINTS PURGE;  Which two statements are true about the effect of the command()ANo flashback is possible to bring back the ITEM table.BThe ORDER table is dropped along with the ITEM table.CThe dependent referential integrity constraints in the ORDER table are disabled.DThe dependent referential integrity constraints in the ORDER table are removed.EThe table definition of the ITEM table and associated indexes are placed in the recycle bin.

考题 多选题Which two statements about NTP version 4 are true?()AIt supports fast synchronization at starting and before network failuresBIt supports automatic server discoveryCIt uses a fixed-point arithmetionDIt supports the nanokernel kernel implementationEIt does not support Public-Key Cryptography

考题 多选题Which two statements regarding symmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption.

考题 多选题Which two statements are true about encrypting RMAN backup?() (Choose two.)AThe transparent encryption of backups uses the encryption walletBThe database uses the same encryption key for every encrypted backupCThe password encryption of backups only uses the password while creating and restoring backupDIf transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.