网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
How does DB2 protect the integrity of indexes when data is updated?()
A
Locks are acquired on the data.
B
Locks are acquired on index keys.
C
Locks are acquired on index pages.
D
Locks are acquired on index pointers.
参考答案
参考解析
解析:
暂无解析
更多 “单选题How does DB2 protect the integrity of indexes when data is updated?()A Locks are acquired on the data.B Locks are acquired on index keys.C Locks are acquired on index pages.D Locks are acquired on index pointers.” 相关考题
考题
—I’dlike to know______. —At 6: 30.
A.when does your mother usuallycookbreakfastB.how your mother usually cooksbreakfastC.when your mother usually cooksbreakfastD.how does your mother usually cookbreakfast
考题
- ()- It arrives by mail, I suppose.
A、How does your remittance comeB、When will your remittance arriveC、From which country does your remittance come
考题
When a host transmits data across a network to another host, which process does the data go through?()
A.standardizationB.conversionC.encapsulationD.synchronization
考题
Which option ensures that data is not modified in transit?()A、AuthorizationB、ConfidentialityC、AuthenticationD、Integrity
考题
In which situations does the Oracle Data Pump use external tables and not the direct path load whileexporting a table()A、if a table is not in a clusterB、if a table has an active triggerC、if a table has an encryptedD、if a table has a column of data type LONG defined on itE、if a table has a referential integrity constraint defined on it
考题
When does a transaction complete?()A、when a DELETE statement is executed B、when a ROLLBACK command is executed C、when a PL/SQL anonymous block is executed D、when a data definition language (DDL) statement is executed E、when a TRUNCATE statement is executed after the pending transact ion
考题
()is not a physical wall, but a lot of virtual data to protect the computer network. A、Data wallB、Data ChannelC、Data baseD、firewall
考题
How many users does the Cisco Unity Express Solution Support When installed in the Cisco 2800 Family?()A、120B、240C、48D、96
考题
When a host transmits data across a network to another host, which process does the data go through?()A、standardizationB、conversionC、encapsulationD、synchronization
考题
How does a controller-based access point configured to operate in sniffer mode behave?()A、allows client traffic, captures data on all channelsB、allows client traffic, captures data on a single channelC、allows no client traffic, captures data on all channelsD、allows no client traffic, captures data on a single channel
考题
When executing the massload command to load catalog data into a WebSphere Commerce database on a remote DB2 server,which of the following can be used as valid values for the -method command line parameter?()A、createB、importC、loadD、sqlimportE、update
考题
How does DB2 protect the integrity of indexes when data is updated?()A、Locks are acquired on the data.B、Locks are acquired on index keys.C、Locks are acquired on index pages.D、Locks are acquired on index pointers.
考题
Which of the following best describes how locks are used in DB2?()A、To maintain control of updated rows for commit processingB、To ensure only committed changes are altered by another applicationC、To allow two applications to update the same row of data simultaneouslyD、To prevent multiple applications from accessing the same data simultaneously
考题
Which parameter allows SQL*Loader to load data into a table with the indexes in the unusable state, prior to the load operation?()A、INDEXESB、SKIP_INDEXES_MAINTENANCEC、SKIP_UNUSABLE_INDEXESD、RESUMABLEE、INDEXES_UNUSABLE
考题
单选题Which of the following tools can make recommendations for indexes and/or MQTs to improve the performance of DB2 applications?()A
Design AdvisorB
Visual ExplainC
Performance AdvisorD
Configuration Assistant
考题
单选题For years an acrimonious debate over how to protect heroin users impeded efforts in the U.S. to control the spread of AIDS.A
convoluted B
belied C
stoked D
encumbered
考题
单选题Which of the following best describes how locks are used in DB2?()A
To maintain control of updated rows for commit processingB
To ensure only committed changes are altered by another applicationC
To allow two applications to update the same row of data simultaneouslyD
To prevent multiple applications from accessing the same data simultaneously
考题
单选题How does a vessel’s rate of turn change when entering shallow water?()A
It is fasterB
It is slowerC
There is no changeD
It remains constant for varying propeller revolutions
考题
单选题Your are the DBA supporting an Oracle 11g Release 2 database and wish to move a table containing several DATE, CHAR, VARCHAR2, and NUMBER data types, and the table’s indexes, to another tablespace. The table does not have a primary key and is used by an OLTP application. Which technique will move the table and indexes while maintaining the highest level of availability to the application?()A
Oracle Data Pump.B
An ALTER TABLE MOVE to move the table and ALTER INDEX REBUILD to move the indexes.C
An ALTER TABLE MOVE to move the table and ALTER INDEX REBUILD ONLINE to move the indexes.D
Online Table Redefinition.E
Edition-Based Table Redefinition.
考题
单选题When importing a table into a database,the import process performs these tasks: 1. Triggers are imported. 2. Data is imported. 3. New tables are created. 4. Indexes are built. 5. Any bitmap, functional, and/or domain indexes are built. 6. Integrity constraints are enabled on the new tables. Which option shows the tasks in the order in which they are performed?()A
2,3,4,1,6,5B
3,2,4,1,6,5C
3,2,6,4,1,5D
4,2,3,1,5,6
考题
多选题Which classes does the U.S. government place classified data into? ()ATop-secretBConfidentialCSBUDSecret
考题
多选题In which situations does the Oracle Data Pump use external tables and not the direct path load whileexporting a table()Aif a table is not in a clusterBif a table has an active triggerCif a table has an encryptedDif a table has a column of data type LONG defined on itEif a table has a referential integrity constraint defined on it
考题
单选题According to the Chemical Data Guide,what does ethyl chloride produce when ignited?()A
Toxic fumes of oxides of nitrogenB
Toxic fumes of leadC
Poisonous phosgene gasD
Poisonous chlorine gas
考题
多选题When executing the massload command to load catalog data into a WebSphere Commerce database on a remote DB2 server,which of the following can be used as valid values for the -method command line parameter?()AcreateBimportCloadDsqlimportEupdate
考题
单选题Context-Based Access Control (CBAC) is the algorithm of the Cisco IOS firewall feature. How does CBAC improve Teleworker security?()A
Inbound packets are permitted only if they are part of a legitimate data flow initiated by a device on the Teleworker home network.B
All packets are checked for integrity by analyzing their checksum.C
Every packet is checked to see if it was sent through the VPN tunnel.D
Every packet is inspected to see if any disallowed URLs are included. URLs are forwarded to the security cache engine for authorization.
考题
单选题You have table 'apps','userdata' on server that uses MyISAM storage engine. You want to transfer this data to server but use InnoDB engine instead. You execute the following commands: ServerB commands: Shell> mysqldump –u root –h server –no-data apps userdata | mysql –u root –p apps Shell> mysql –u root –p –h server –e 'ALTER TABLE 'apps','userdata' ENGINE=InnoDB;' Shell> mysqldump –u root –p –h server –no-create-info –order-by-primary apps userdata | mysql –u root –p apps What effect does the – order-by-primary argument have on the mysqldump command?()A
It exports tables with the most indexes first to assist with import speedsB
It ensures that unique indexes have no conflicts when the data is dumpedC
It orders by primary key to assist in speeding up importing to InnoDB tablesD
It must be specified so index data is dumped correctly when –on-create-info is used
考题
问答题How does Virginius feel when Browning’s poem became unpopular?
热门标签
最新试卷