网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
To which of the following resources can a lock be applied?()
- A、Row
- B、Alias
- C、Bitmap
- D、Column
参考答案
更多 “To which of the following resources can a lock be applied?()A、RowB、AliasC、BitmapD、Column” 相关考题
考题
Consider the following:Which statement best describes the meaning of the value for the key_len column?()
A.It shows the total size of the index rowB.It shows how many columns in the index are examinedC.It shows the number of characters indexed in the keyD.It shows how many bytes will be used from each index row
考题
Which of the following is NOT true about the centrifugal separator?
A.It can be applied to separate two liquidsB.It cannot separate solids which contaminated in the oil.C.It consists of purifier and clarifierD.The centrifuge arranged to separate two liquids is known as purifier
考题
A group of users report that they can access local resources but cannot access the Internet. Which of the following should the administrator use to test connectivity?()
A. tracertB. msconfigC. routeD. net use
考题
Which of the following constraint types can be used to ensure the value of an INTEGER column references only positive values?()
A.UniqueB.CheckC.ReferentialD.Informational
考题
Which kind of non-sourced UDF can be created so that it only returns a single value?()
A.RowB.TableC.ScalarD.Column
考题
Which of the following DB2 objects are publicly referenced names that require no special authority or privilege to use them?()
A.ViewB.AliasC.TableD.Package
考题
Which of the following can be used to ensure that once a row has been inserted in table TABLEX, the column MAINID in that row cannot be updated?()
A.Define the column MAINID as NOT UPDATABLEB.Define the column MAINID as a PRIMARY KEYC.Define the column MAINID as a FOREIGN KEYD.Define an UPDATE trigger on table TABLEX
考题
Which of the following constraint types can be used to ensure the value of an INTEGER column references only positive values?()A、UniqueB、CheckC、ReferentialD、Informational
考题
In IPCCX, skills can be assigned to which of the following configuration objects?()A、resources B、Skill Groups C、competence levels D、Resource Groups
考题
Which of the following is true about the following share access properties? ()A、 +managers will be resolved as a Winbind group. B、 The timo and taki users can manipulate files regardless of the file system permissions. C、 +managers will be resolved as a Unix group. D、 +managers is a builtin default Samba group. E、 The "admin users" can be applied only to print shares.
考题
Which of the following resources can be referenced in the LOCK statement?()A、RowB、TableC、ColumnD、Table space
考题
A group of users report that they can access local resources but cannot access the Internet. Which of the following should the administrator use to test connectivity?()A、 tracertB、 msconfigC、 routeD、 net use
考题
When the length of the run queues, process or thread dispatches interrupts, and lock contention metrics and statistics are analyzed for performance, which of the following resources is being analyzed?()A、 CPUB、 MemoryC、 Disk I/OD、 Network I/O
考题
Which of the following DB2 objects are publicly referenced names that require no special authority or privilege to use them?()A、ViewB、AliasC、TableD、Package
考题
Users complain an AIX server is running slow. Which of the following commands can be run to determine what is consuming systems resources?()A、 tprofB、 lpstatC、 ps auxD、 entstat
考题
Which of the following commands can be used to commit applied filesets?()A、 /usr/sbin/installp -CB、 /usr/sbin/inutoc -cC、 /usr/sbin/installp -cD、 /usr/sbin/lsresource -c
考题
Which of the following can be used to ensure that once a row has been inserted in table TABLEX, the column MAINID in that row cannot be updated?()A、Define the column MAINID as NOT UPDATABLEB、Define the column MAINID as a PRIMARY KEYC、Define the column MAINID as a FOREIGN KEYD、Define an UPDATE trigger on table TABLEX
考题
which one of the following best describes the use of hidden column formula?()A、views can be hidden based on a formula B、hidden columns are not a supported feature C、table columns can be hidden based on a formula D、view columns can be displayed or hidden based on a formula
考题
单选题Users complain an AIX server is running slow. Which of the following commands can be run to determine what is consuming systems resources?()A
tprofB
lpstatC
ps auxD
entstat
考题
单选题Which of the following commands can be used to commit applied filesets?()A
/usr/sbin/installp -CB
/usr/sbin/inutoc -cC
/usr/sbin/installp -cD
/usr/sbin/lsresource -c
考题
单选题When the length of the run queues, process or thread dispatches interrupts, and lock contention metrics and statistics are analyzed for performance, which of the following resources is being analyzed?()A
CPUB
MemoryC
Disk I/OD
Network I/O
考题
单选题A group of users report that they can access local resources but cannot access the Internet. Which of the following should the administrator use to test connectivity?()A
tracertB
msconfigC
routeD
net use
考题
单选题Which of the following resources can be referenced in the LOCK statement?()A
RowB
TableC
ColumnD
Table space
热门标签
最新试卷