网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
To which of the following resources can a lock be applied?()
A

Row

B

Alias

C

Bitmap

D

Column


参考答案

参考解析
解析: 暂无解析
更多 “单选题To which of the following resources can a lock be applied?()A RowB AliasC BitmapD Column” 相关考题
考题 Consider the following:Which statement best describes the meaning of the value for the key_len column?() A.It shows the total size of the index rowB.It shows how many columns in the index are examinedC.It shows the number of characters indexed in the keyD.It shows how many bytes will be used from each index row

考题 Which of the following constraint types can be used to ensure the value of an INTEGER column references only positive values?() A.UniqueB.CheckC.ReferentialD.Informational

考题 Which kind of non-sourced UDF can be created so that it only returns a single value?() A.RowB.TableC.ScalarD.Column

考题 Which of the following resources can be explicitly locked?() A.RowB.PageC.TableD.Column

考题 Which of the following can be used to ensure that once a row has been inserted in table TABLEX, the column MAINID in that row cannot be updated?() A.Define the column MAINID as NOT UPDATABLEB.Define the column MAINID as a PRIMARY KEYC.Define the column MAINID as a FOREIGN KEYD.Define an UPDATE trigger on table TABLEX

考题 Which of the following constraint types can be used to ensure the value of an INTEGER column references only positive values?()A、UniqueB、CheckC、ReferentialD、Informational

考题 In IPCCX, skills can be assigned to which of the following configuration objects?()A、resources  B、Skill Groups  C、competence levels  D、Resource Groups

考题 Which of the following resources can be referenced in the LOCK statement?()A、RowB、TableC、ColumnD、Table space

考题 Which of the following resources can be explicitly locked?()A、RowB、PageC、TableD、Column

考题 When the length of the run queues, process or thread dispatches interrupts, and lock contention metrics and statistics are analyzed for performance, which of the following resources is being analyzed?()A、 CPUB、 MemoryC、 Disk I/OD、 Network I/O

考题 Which of the following DB2 objects are publicly referenced names that require no special authority or privilege to use them?()A、ViewB、AliasC、TableD、Package

考题 To which of the following resources can a lock be applied?()A、RowB、AliasC、BitmapD、Column

考题 Users complain an AIX server is running slow.  Which of the following commands can be run to determine what is consuming systems resources?()A、 tprofB、 lpstatC、 ps auxD、 entstat

考题 Which of the following commands can be used to commit applied filesets?()A、 /usr/sbin/installp -CB、 /usr/sbin/inutoc -cC、 /usr/sbin/installp -cD、 /usr/sbin/lsresource -c

考题 Which of the following can be used to ensure that once a row has been inserted in table TABLEX, the column MAINID in that row cannot be updated?()A、Define the column MAINID as NOT UPDATABLEB、Define the column MAINID as a PRIMARY KEYC、Define the column MAINID as a FOREIGN KEYD、Define an UPDATE trigger on table TABLEX

考题 which one of the following best describes the use of hidden column formula?()A、views can be hidden based on a formula B、hidden columns are not a supported feature C、table columns can be hidden based on a formula  D、view columns can be displayed or hidden based on a formula 

考题 单选题Which of the following constraint types can be used to ensure the value of an INTEGER column references only positive values?()A UniqueB CheckC ReferentialD Informational

考题 单选题Users complain an AIX server is running slow.  Which of the following commands can be run to determine what is consuming systems resources?()A  tprofB  lpstatC  ps auxD  entstat

考题 单选题Which of the following commands can be used to commit applied filesets?()A  /usr/sbin/installp -CB  /usr/sbin/inutoc -cC  /usr/sbin/installp -cD  /usr/sbin/lsresource -c

考题 单选题To which of the following resources can a lock be applied?()A RowB AliasC BitmapD Column

考题 单选题When the length of the run queues, process or thread dispatches interrupts, and lock contention metrics and statistics are analyzed for performance, which of the following resources is being analyzed?()A  CPUB  MemoryC  Disk I/OD  Network I/O

考题 单选题A group of users report that they can access local resources but cannot access the Internet. Which of the following should the administrator use to test connectivity?()A  tracertB  msconfigC  routeD  net use

考题 单选题Which of the following resources can be explicitly locked?()A RowB PageC TableD Column

考题 单选题A group of users report that they can access local resources but cannot access the Internet. Which of the following should the administrator use to test connectivity?()A tracertB msconfigC routeD net use

考题 单选题Which of the following can be used to ensure that once a row has been inserted in table TABLEX, the column MAINID in that row cannot be updated?()A Define the column MAINID as NOT UPDATABLEB Define the column MAINID as a PRIMARY KEYC Define the column MAINID as a FOREIGN KEYD Define an UPDATE trigger on table TABLEX

考题 单选题Which of the following resources can be referenced in the LOCK statement?()A RowB TableC ColumnD Table space

考题 单选题Consider the following: Which statement best describes the meaning of the value for the key_len column?()A It shows the total size of the index rowB It shows how many columns in the index are examinedC It shows the number of characters indexed in the keyD It shows how many bytes will be used from each index row

考题 单选题which one of the following best describes the use of hidden column formula?()A views can be hidden based on a formula B hidden columns are not a supported feature C table columns can be hidden based on a formula  D view columns can be displayed or hidden based on a formula