网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
A user issues a SELECT command against the Oracle database. Which of the following choices describes a step that Oracle will execute in support of this statement?()
- A、Acquire locks on table queried
- B、Generate redo for statement
- C、Fetch data from disk into memory
- D、Write changes to disk
参考答案
更多 “ A user issues a SELECT command against the Oracle database. Which of the following choices describes a step that Oracle will execute in support of this statement?()A、Acquire locks on table queried B、Generate redo for statement C、Fetch data from disk into memory D、Write changes to disk” 相关考题
考题
Your database interface is running. A user SCOTT starts a SQL *Plus session, and issues the following query:SQL SELECT * FROM sales;Which process would retrieve the result from the database and return it to the client program?()A. User processB. Server processC. System Monitor (SMON)D. Process Monitor (PMON)E. Checkpoint process (CKPT)
考题
The DBA issues this SQL command: CREATE USER scott IDENTIFIED by tiger; What privileges does the user Scott have at this point?()
A. no privilegesB. only the SELECT privilegeC. only the CONNECT privilegeD. all the privileges of a default user
考题
The user Sue issues this SQL statement:GRANT SELECT ON sue. EMP TO alice WITH GRANT OPTION; The user Alice issues this SQL statement:GRANT SELECT ON sue. EMP TO reena WITH GRANT OPTION; The user Reena issues this SQL statement:GRANT SELECT ON sue. EMP TO timber;The user Sue issues this SQL statement:REVOKE select on sue. EMP FROM alice;For which users does the revoke command revoke SELECT privileges on the SUE.EMP table?()A. Alice onlyB. Alice and ReenaC. Alice, Reena, and TimberD. Sue, Alice, Reena, and Timber
考题
View the Exhibit for some of the current parameter settings. A user logs in to the HR schema and issues the following commands:SQL CREATE TABLE emp(empno NUMBER(3),ename VARCHAR2(20),sal NUMBER(8,2));SQL INSERT INTO emp(empno,ename) VALUES(1,‘JAMES‘);At this moment, a second user also logs in to the HR schema and issues the following command:SQL ALTER TABLE emp MODIFY sal NUMBER(10,2);What happens in the above scenario?()A. The second user‘s session immediately produces the resource busy error.B. The second user‘s command executes successfully.C. The second user‘s session waits for a time period before producing the resource busy error.D. A deadlock is created.
考题
The DBA issues this SQL command:What privileges does the user Scott have at this point?()
A. No privileges.B. Only the SELECT privilege.C. Only the CONNECT privilege.D. All the privileges of a default user.
考题
Which of the following describes the BEST course of action when a user continuously calls atechnician with computer issues instead of the helpdesk?()
A. Put all other work orders on hold and assist the user with all their computer issues.B. Have another technician take over support calls for this user.C. Explain that the user needs to fill out a work order for the computer problems.D. Ask the user to call another technician for more in-depth assistance.
考题
Which of the following would be the BEST process for the technician to follow when beginning to diagnose a unit at a customers site?()A、Check the printers error log, and then inform the primary user what the issue is.B、Go directly to the printer and investigate any issues that are found.C、Investigate the printers status, then ask the primary user to write down what they think is wrong.D、Gather information from the primary user, and then evaluate the printers condition.
考题
A user reports that they are unable to reach a particular website. The user had no issues reaching the site earlier in the day. Which of the following is the MOST likely cause of the lack of access?()A、The VLAN is misconfiguredB、The user has an improperly configured NICC、The DHCP server is downD、The DNS server is down
考题
A user is reporting a loud grinding sound when the machine is powered on. The machine loadsinto windows and the user does not notice any performance issues. Which of the following is the MOST likely cause of the noise?()A、PowersupplyfailureB、BadHDC、BadfanD、FaultyCD-Rom
考题
Which of the following describes the BEST course of action when a user continuously calls atechnician with computer issues instead of the helpdesk?()A、Put all other work orders on hold and assist the user with all their computer issues.B、Have another technician take over support calls for this user.C、Explain that the user needs to fill out a work order for the computer problems.D、Ask the user to call another technician for more in-depth assistance.
考题
In a TCP/IP network, which of the following protocols is involved when a user issues a ping command?()A、TCPB、UDPC、ICMPD、SMTP
考题
Your database interface is running. A user SCOTT starts a SQL *Plus session, and issues the following query: SQL SELECT * FROM sales; Which process would retrieve the result from the database and return it to the client program?()A、User processB、Server processC、System Monitor (SMON)D、Process Monitor (PMON)E、Checkpoint process (CKPT)
考题
The DBA issues this SQL command:CREATE USER scott IDENTIFIED by tiger;What privileges does the user Scott have at this point?()A、no privilegesB、only the SELECT privilegeC、only the CONNECT privilegeD、all the privileges of a default user
考题
The DBA issues this SQL command: CREATE USER scott IDENTIFIES by tiger; What privileges does the user Scott have at this point? ()A、No privileges.B、Only the SELECT privilege.C、Only the CONNECT privilege.D、All the privileges of a default user.
考题
User A issues the command: LOCK TABLES pets READ; Which command can User B execute against the pets table?()A、UPDATE pets…B、SELECT….FROM petsC、INSERT INTO pets…D、ALTER TABLE pets…
考题
Rate your level of proficiency with creating and managing users, computers, and groups in an ActiveDirectory environment, including troubleshooting computer accounts, user accounts, and userauthentication issues. ()A、Very HighB、HighC、ModerateD、LowE、Very Low
考题
单选题An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on solution to help address security and productivity issues. Per their corporate security policy, the organization has detailed requirements related to password management for their enterprise applications. Which password requirements need to be captured?()A
details related to application user ID requirementsB
policy requirements related to the number of applications that a user can accessC
policy requirements for application and user initiated password resets and password complexityD
do nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project
考题
单选题The DBA issues this SQL command: CREATE USER scott IDENTIFIED by tiger; What privileges does the user Scott have at this point?()A
no privilegesB
only the SELECT privilegeC
only the CONNECT privilegeD
all the privileges of a default user
考题
单选题The user Sue issues this SQL statement: GRANT SELECT ON sue. EMP TO alice WITH GRANT OPTION; The user Alice issues this SQL statement: GRANT SELECT ON sue. EMP TO reena WITH GRANT OPTION; The user Reena issues this SQL statement: GRANT SELECT ON sue. EMP TO timber; The user Sue issues this SQL statement: REVOKE select on sue. EMP FROM alice; For which users does the revoke command revoke SELECT privileges on the SUE.EMP table?()A
Alice onlyB
Alice and ReenaC
Alice, Reena, and TimberD
Sue, Alice, Reena, and Timber
考题
单选题Your database interface is running. A user SCOTT starts a SQL *Plus session, and issues the following query: SQL SELECT * FROM sales; Which process would retrieve the result from the database and return it to the client program?()A
User processB
Server processC
System Monitor (SMON)D
Process Monitor (PMON)E
Checkpoint process (CKPT)
考题
单选题A user issues a SELECT command against the Oracle database. Which of the following choices describes a step that Oracle will execute in support of this statement?()A
Acquire locks on table queried B
Generate redo for statement C
Fetch data from disk into memory D
Write changes to disk
考题
单选题Your database interface is running. A user SCOTT starts a SQL *Plus session, and issues the following query: SQL SELECT * FROM sales; Which process would retrieve the result from the database and return it to the client program?()A
User processB
Server processC
System Monitor (SMON)D
Process Monitor (PMON)E
Checkpoint process (CKPT)
考题
单选题A user reports that they are unable to reach a particular website. The user had no issues reaching the site earlier in the day. Which of the following is the MOST likely cause of the lack of access?()A
The VLAN is misconfiguredB
The user has an improperly configured NICC
The DHCP server is downD
The DNS server is down
考题
单选题The user HR owns the EMP table. The user HR grants privileges to the user SCOTT by using this command: SQL GRANT SELECT,INSERT,UPDATE ON emp TO scott WITH GRANT OPTION; The user SCOTT executes this command to grant privileges to the user JIM: SQL GRANT SELECT,INSERT,UPDATE ON hr.emp TO jim; Now, the user HR decides to revoke privileges from JIM using this command: SQL REVOKE SELECT,INSERT,UPDATE ON emp FROM jim; Which statement is true after HR issues the REVOKE command()A
The command fails because SCOTT still has privileges.B
The command succeeds and privileges are revoked from JIM.C
The command fails because HR cannot revoke the privileges from JIM.D
The command succeeds and only HR has the privilege to perform the SELECT, INSERT, and UPDATEoperations on the EMP table.
考题
单选题The DBA issues this SQL command: CREATE USER scott IDENTIFIES by tiger; What privileges does the user Scott have at this point? ()A
No privileges.B
Only the SELECT privilege.C
Only the CONNECT privilege.D
All the privileges of a default user.
考题
单选题Your company is planning to deploy Windows 7 to all client computers. You have the following requirements: Test an application to detect potential compatibility issues caused by User Account Control (UAC). Monitor an application’s operating system use. You need to select the appropriate method to detect application compatibility issues. What should you do?()A
Use the Standard User Analyzer tool.B
Use the Standard User Analyzer Wizard.C
Use the standalone Setup Analysis Tool.D
Use the Setup Analysis Tool in a virtual environment.
考题
单选题Rate your level of proficiency with creating and managing users, computers, and groups in an ActiveDirectory environment, including troubleshooting computer accounts, user accounts, and userauthentication issues. ()A
Very HighB
HighC
ModerateD
LowE
Very Low
考题
单选题User A executes the following command to update the TRANS table) SQL UPDATE B.trans SET tr_amt=tr_amt+500 WHERE c_code=’C005’; Before user A issues a COMMIT or ROLLBACK command, user B executes the following command on the TRANS table: SQl ALTER TABLE trans MODIFY (tr_type VARCHAR2 (3)); What would happen in this scenario?()A
The transaction for user A is rolled back.B
The ALTER TABLE command modifies the column successfully.C
The ALTER TABLE command fails due to the resource being busy.D
The ALTER TABLE command waits until user A ends the transaction.
热门标签
最新试卷