网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
john has created a database library, librarians are responsible for adding new information to the db library. which one of the following minimum level of access he can grant the librarians of the db library?()
- A、 reader
- B、 author
- C、 manager
- D、 designer
参考答案
更多 “john has created a database library, librarians are responsible for adding new information to the db library. which one of the following minimum level of access he can grant the librarians of the db library?()A、 readerB、 authorC、 managerD、 designer” 相关考题
考题
A new company has been given one public IP address. The company employs 200 users requiring Internet access from the headquarters.Which of the following can be implemented to provide Internet access for all the employees?()A. MulticastingB. Proxy serverC. NATD. Subnetting
考题
johnhascreatedadatabaselibrary,librariansareresponsibleforaddingnewinformationtothedblibrary.whichoneofthefollowingminimumlevelofaccesshecangrantthelibrariansofthedblibrary?()
A.readerB.authorC.managerD.designer
考题
根据下面资料,回答
A library is a place which people can find out almost anything. A person just needs library card to borrow a book to be taken home. The person goes to the main desk to have a library helper check the book out. The helper print the card with the date by that the book must be returned back to the library. If the book has returned late, the person must pay money to having broken the rule. Books in a library put in a certain order to help people find what they want. In some libraries, all the books of animals may be put together. In other libraries, all the books writing by the same person may be placed together.
第四处
考题
An application that needs to use a shared library has a deployment descriptor that only specifies the Specification-Version and Extension-Name of the shared library. When the application is deployed, which shared library will be used?()A、The application will go into an ADMIN state and fail to deploy because the Implementation- Version is required.B、The application will be deployed but the classes in the shared library will not be available.C、If you are using the WebLogic Admin Console, you will be prompted for the version you want to use; otherwise, the application will fail to deploy.D、If there are multiple versions of the shared library deployed, WebLogic will use the one with the highest Implementation-Version.E、If there are multiple versions of the shared library deployed, WebLogic will use the one that was deployed most recently.
考题
You have a server that runs Windows Server 2008. The server has the Windows SharePoint Services (WSS) server role installed. The server is configured to accept incoming e-mail. You create a new document library. You need to ensure that any user can send e-mail to the document library. What should you do?()A、Modify the RSS setting for the document library.B、Modify the permissions for the document library.C、Modify the incoming e-mail settings for the document library.D、Enable anonymous authentication for the Web application.
考题
You work as an application developer at Certkiller .com. Certkiller .com has been hired by a small local private school to develop a class library that will be used in an application named ManageAttendance for the purpose of managing student records.You are responsible for developing this class library. Certkiller .com has instructed you to create a collection in the application to store learners’ results. The school has informed you that they currently only have seven learners, but that this value will triple in the following year. Due to the limited resources, you need to ensure that the collection you create consumes a minimum amount of resources. What should you use to create the collection?()A、 The HybridDictionary collection class.B、 The HashTable collection class.C、 The ListDictionary collection class.D、 The StringCollection collection class.
考题
A new company has been given one public IP address. The company employs 200 users requiring Internet access from the headquarters. Which of the following can be implemented to provide Internet access for all the employees?()A、MulticastingB、Proxy serverC、NATD、Subnetting
考题
An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()A、WMIB、RISC、DNSD、SNMPE、SMTP
考题
An administrator is up grading the back up server from a single tape drive to a SCSI tape library. The library has been unpackaged, mounted, and the library drivers installed. Which of the following items should the administrator have to connect the device to the backup server?()A、 SCSI cableB、 SCSI interface adapter on the tape libraryC、 SCSI termination card on the serverD、 iSCSI cable
考题
Which of the following is TRUE for the DB2 isolation level Cursor Stability (CS)?()A、An application process acquires at least a share lock on the current row of every cursor.B、Any row that is read during a unit of work cannot be changed by other application processes until the unit of work is complete.C、Any row changed by another application process can be read, even if the change has not been committed by that application process.D、An application process that issues the same query more than once in a unit of work will not see additional rows caused by other application processes appending new information to the database.
考题
A system is being planned with three production partitions, one each for an IBM i, AIX standard edition, and Power Linux applications. One fibre-channel attached TS3100 tape library will be shared between the partitions for backup. Which solution provides tape library sharing with minimum operator intervention?()A、Configure VIO Server Express Edition to control the tape library through one fibre channel card.Assign the library to the production partitions when needed.B、Configure the IBM i partition to own the tape library.Use IBM i virtualization to host a virtual tape libraryconnection to the AIX and Linux partition.Assign the library to the production partitions when needed.C、Configure a fibre channel card for each partition, and a configure fibre switch.Connect the partitions and tape library to the switch.Zone the switch so all partitions can enable the tape when needed and disable the tape when finished.D、Configure AIX to control the tape library through one fibre channel adapter.Use AIX virtualization to host a virtual tape library connection to the IBM i and Linux partitions.Assign the library to the production partitions when needed.
考题
Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A、The database user must be created using DB2 Control Center.B、The database user must be created using the DB2 Command Line Processor.C、The database user may be created using DB2 Control Center or DB2 Command Line Processor.D、The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.
考题
Which statement is true about the database and database-user used during installation of IMS Server?()A、A preexisting database user may be used but a new database has to be created during installation.B、A preexisting database may be used but a new database user has to be created during installation.C、A preexisting database and user may be used or a new database and user are created during installation.D、A preexisting database and user cannot be used; a new database and user are created during installation.
考题
Which one of the following provides the capability to partition the 3584 Tape Library into separatelogical libraries?()A、Control Path Failover B、Enhanced Frame Control C、Advanced Library Management System D、High Availability Library Control
考题
You are adding redo logs to the Oracle database. Creating a new redo log adds information to which of the following Oracle resources? ()A、Shared pool B、Control file C、SGA D、PGA
考题
You are analyzing how Oracle processes user statements. SQL and PL/SQL parse information is stored in which of the following database memory areas? ()A、Library cache B、Row cacheC、Dictionary cache D、Large area E、Buffer cache
考题
You are part of the DBA team working for a multinational bank. The team is responsible for performing administrative tasks on the database server located at the home office. The database server at the home office has a production database and a test database named TESTDB. The test database is primarily used for testing database commands and configuration settings befor implementing these settings on the production database. The test database is also used for the development of database applications. You have been asked by the senior DBA to grant the SYSDBA privilege to a new team member, John, so that he can perform some administrative tasks, such as shutdown and startup operations, on TESTDB. You use the password file to configure remote authentication on the TESTDB database. You execute the following statement to grant the SYSDBA privilege to John: SQLGRANT SYSDBA TO john; However, you receive the following error: ORA-01996: GRANT failed: password file ’c:/oracle/ora9i/dbs/testdb.pwd’ is full Which action should you take to add the user john to the password file without removing any of the existing users?()A、 Create another password file and then re-execute the GRANT statement.B、 Re-create the password file, specifying a larger number of allowed entries, and then re-execute the GRANT statement.C、 Change the value of the REMOTE_LOGIN_PASSWORDFILE initialization parameter in theinitialization parameter file to NONE and then re-execute the GRANT statement.D、 Change the value of the REMOTE_LOGIN_PASSWORDFILE initialization parameter in the initialization parameter file to SHARED and then re-execute the GRANT statement.
考题
Records from the data dictionary information are stored in which of the following database memory areas?()A、Library cache B、Row cache C、Session UGA D、Buffer cache
考题
You are managing an Oracle Database 10g database that uses Oracle Managed Files (OMF). You enabled the block change tracking feature for the database. Which statement regarding the change tracking file is true?()A、 One block change tracking file is created for each data file. By default, the file is created in DB_CREATE_FILE_DEST.B、 One block change tracking file is created for each data file. By default, the file is created in BACKGROUND_DUMP_DEST.C、 One block change tracking file is created for the database. By default, the file is created in DB_CREATE_FILE_DEST.D、 One block change tracking file is created for the database. By default, the file is created in BACKGROUND_DUMP_DEST.
考题
A full backup of your database named DB1 is created automatically at midnight every day. Differential backups of DB1 occur twice each day at 10:00 and at 16:00. A database snapshot is created every day at noon. A developer reports that he accidentally dropped the Pricelist table in DB1 at 12:30. The last update to Pricelist occurred one week ago. You need to recover the Pricelist table. You want to achieve this goal by using the minimum amount of administrative effort. You must also minimize the amount of data that is lost. What should you do?()A、 Restore the most recent backup into a new database named DB1bak. Apply the most recent differential backup. Copy the Pricelist table from DB1bak to DB1. B、 Delete all database snapshots except the most recent one. Restore DB1 from the most recent database snapshot. C、 Recover DB1 from the most recent backup. Apply the most recent differential backup. D、 Copy the Pricelist table from the most recent database snapshot into DB1.
考题
单选题john has created a database library, librarians are responsible for adding new information to the db library. which one of the following minimum level of access he can grant the librarians of the db library?()A
readerB
authorC
managerD
designer
考题
单选题An administrator is up grading the back up server from a single tape drive to a SCSI tape library. The library has been unpackaged, mounted, and the library drivers installed. Which of the following items should the administrator have to connect the device to the backup server?()A
SCSI cableB
SCSI interface adapter on the tape libraryC
SCSI termination card on the serverD
iSCSI cable
考题
单选题You are a systems administrator responsible for securing a Windows Server 2008 Web server. You havecreated a new Web site called Contoso Intranet that will contain seven Web applications. One of theapplication developers has told you that her Web application requires a new request handler that isprocessed using a .NET library her team created. How can you meet these requirements while also maximizing security for the server?()A
Add a new managed handler to the Contoso Intranet Web site.B
Add a new managed handler for the specific Web application that requires it.C
Add a new module mapping to the Contoso Intranet Web site.D
Add a new module mapping for the specific Web application that requires it.
考题
多选题An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()AWMIBRISCDNSDSNMPESMTP
考题
单选题Which of the following is TRUE for the DB2 isolation level Cursor Stability (CS)?()A
An application process acquires at least a share lock on the current row of every cursor.B
Any row that is read during a unit of work cannot be changed by other application processes until the unit of work is complete.C
Any row changed by another application process can be read, even if the change has not been committed by that application process.D
An application process that issues the same query more than once in a unit of work will not see additional rows caused by other application processes appending new information to the database.
考题
单选题Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A
The database user must be created using DB2 Control Center.B
The database user must be created using the DB2 Command Line Processor.C
The database user may be created using DB2 Control Center or DB2 Command Line Processor.D
The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.
考题
单选题A
They can buy new books.B
They can change to a computer system.C
They can change the librarians there.D
They can reprint all the cards.
热门标签
最新试卷