网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
create trigger 语句中的with encryption 参数的作用是( )
A 加密触发器文本
B加密定义触发器的数据库
C 加密定义触发器的数据库的数据
D 以上都不对
参考答案
更多 “ create trigger 语句中的with encryption 参数的作用是( ) A 加密触发器文本B加密定义触发器的数据库C 加密定义触发器的数据库的数据D 以上都不对 ” 相关考题
考题
A user needs to create a trigger that will update table T2 whenever a row is added to table T1. Assuming the user has all appropriate privileges for table T2, which privilege is required on table T1 to create the trigger?()A.REFERENCESB.SELECTC.UPDATED.ALTER
考题
在CREATE DATABASE语句中,使用()参数,可以为每个数据库指定联机重做日志文件的最大组数。
A.MAXFILESB.MAXLOGFILEC.MAXLOGFILESD.LOGFILES
考题
A storage specialist needs to automate some tasks triggered in the event of disaster recovery. What is the best solution to accomplish this()A、using the DS GUI, step through Real Time Manager, Copy Services, Create custom scripts; actions and event conditions can be defined that triggerthe script; there is no need for a passwordB、create a shell script usingdscli commands; trigger the script from the operating system, and call the script using the -pwd option with the passwordC、create a password file; create a shell script using dscli commands; trigger the script from the operating systemD、create a password file; create a shell script usingdscli commands; trigger the script from the operating system; call the dscli script with the dscli -script -pwdfile command
考题
What three tasks are required to add a CRS application?()A、create a trigger B、create an application C、restart the CRS engine D、upload script to repository E、configure default session timeout
考题
A user needs to create a trigger that will update table T2 whenever a row is added to table T1. Assuming the user has all appropriate privileges for table T2, which privilege is required on table T1 to create the trigger?()A、REFERENCESB、SELECTC、UPDATED、ALTER
考题
Which two statements regarding asymmetric key encryption are true?()A、The same key is used for encryption and decryption.B、It is commonly used to create digital certificate signatures.C、It uses two keys: one for encryption and a different key for decryption.D、An attacker can decrypt data if the attacker captures the key used for encryption
考题
Your company uses a SQL Server 2005 database. Customer data from your trading partners is imported into the Customers table every night. You need to ensure that the customer record is updated if it already exists in the Customers table. If the record does not exist, the data needs to be inserted into the Customers table. What should you do?()A、 Create a FOR trigger. B、 Create an INSTEAD OF trigger. C、 Create an AFTER trigger. D、 Create a DDL trigger.
考题
单选题Your company uses a SQL Server 2005 database. Customer data from your trading partners is imported into the Customers table every night. You need to ensure that the customer record is updated if it already exists in the Customers table. If the record does not exist, the data needs to be inserted into the Customers table. What should you do?()A
Create a FOR trigger. B
Create an INSTEAD OF trigger. C
Create an AFTER trigger. D
Create a DDL trigger.
考题
单选题A storage specialist needs to automate some tasks triggered in the event of disaster recovery. What is the best solution to accomplish this()A
using the DS GUI, step through Real Time Manager, Copy Services, Create custom scripts; actions and event conditions can be defined that triggerthe script; there is no need for a passwordB
create a shell script usingdscli commands; trigger the script from the operating system, and call the script using the -pwd option with the passwordC
create a password file; create a shell script using dscli commands; trigger the script from the operating systemD
create a password file; create a shell script usingdscli commands; trigger the script from the operating system; call the dscli script with the dscli -script -pwdfile command
考题
多选题Which two statements regarding asymmetric key encryption are true?()AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption
考题
单选题The following triggers were defined for table TAB1 in the order shown:CREATE TRIGGER trig_a AFTER UPDATE ON tab1 FOR EACH ROW UPDATE sale_tab SET sale_date = CURRENT DATE; CREATE TRIGGER trig_b AFTER UPDATE ON tab1 FOR EACH STATEMENT UPDATE invoice_tab SET invoice_date = CURRENT DATE; CREATE TRIGGER trig_c AFTER UPDATE ON tab1 FOR EACH ROW UPDATE shipping_tab SET ship_date = CURRENT DATE; CREATE TRIGGER trig_d AFTER UPDATE ON tab1 FOR EACH STATEMENT UPDATE billing_tab SETbilling_date = CURRENT DATE;If an event occurs that causes all of them to activate, which trigger will be activated first?()A
TRIG_AB
TRIG_BC
TRIG_CD
TRIG_D
考题
单选题在CREATE DATABASE语句中,使用()参数,可以为每个数据库指定联机重做日志文件的最大组数。A
MAXFILESB
MAXLOGFILEC
MAXLOGFILESD
LOGFILES
考题
单选题You want to create a temporary table while executing a procedure in a form. Which statement is true?()A
You cannot create a table form within Forms. B
You must use the FORMS_DDL built-in to create the table. C
You must use the DBMS_DYNAMIC_DDL package to create the table. D
You can write the CREATE TABLE statement directly into the trigger.
考题
多选题Which two statements regarding symmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption.
考题
判断题「の」接在体言后面,在句中作连体修饰语,表示领属关系属性等。一般译为「的」。A
对B
错
热门标签
最新试卷