网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
john has created a database library, librarians are responsible for adding new information to the db library. which one of the following minimum level of access he can grant the librarians of the db library?()
A
reader
B
author
C
manager
D
designer
参考答案
参考解析
解析:
暂无解析
更多 “单选题john has created a database library, librarians are responsible for adding new information to the db library. which one of the following minimum level of access he can grant the librarians of the db library?()A readerB authorC managerD designer” 相关考题
考题
johnhascreatedadatabaselibrary,librariansareresponsibleforaddingnewinformationtothedblibrary.whichoneofthefollowingminimumlevelofaccesshecangrantthelibrariansofthedblibrary?()
A.readerB.authorC.managerD.designer
考题
An application that needs to use a shared library has a deployment descriptor that only specifies the Specification-Version and Extension-Name of the shared library. When the application is deployed, which shared library will be used?()A、The application will go into an ADMIN state and fail to deploy because the Implementation- Version is required.B、The application will be deployed but the classes in the shared library will not be available.C、If you are using the WebLogic Admin Console, you will be prompted for the version you want to use; otherwise, the application will fail to deploy.D、If there are multiple versions of the shared library deployed, WebLogic will use the one with the highest Implementation-Version.E、If there are multiple versions of the shared library deployed, WebLogic will use the one that was deployed most recently.
考题
You have a server that runs Windows Server 2008. The server has the Windows SharePoint Services (WSS) server role installed. The server is configured to accept incoming e-mail. You create a new document library. You need to ensure that any user can send e-mail to the document library. What should you do?()A、Modify the RSS setting for the document library.B、Modify the permissions for the document library.C、Modify the incoming e-mail settings for the document library.D、Enable anonymous authentication for the Web application.
考题
You work as an application developer at Certkiller .com. Certkiller .com has been hired by a small local private school to develop a class library that will be used in an application named ManageAttendance for the purpose of managing student records.You are responsible for developing this class library. Certkiller .com has instructed you to create a collection in the application to store learners’ results. The school has informed you that they currently only have seven learners, but that this value will triple in the following year. Due to the limited resources, you need to ensure that the collection you create consumes a minimum amount of resources. What should you use to create the collection?()A、 The HybridDictionary collection class.B、 The HashTable collection class.C、 The ListDictionary collection class.D、 The StringCollection collection class.
考题
A new company has been given one public IP address. The company employs 200 users requiring Internet access from the headquarters. Which of the following can be implemented to provide Internet access for all the employees?()A、MulticastingB、Proxy serverC、NATD、Subnetting
考题
An administrator is up grading the back up server from a single tape drive to a SCSI tape library. The library has been unpackaged, mounted, and the library drivers installed. Which of the following items should the administrator have to connect the device to the backup server?()A、 SCSI cableB、 SCSI interface adapter on the tape libraryC、 SCSI termination card on the serverD、 iSCSI cable
考题
Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A、The database user must be created using DB2 Control Center.B、The database user must be created using the DB2 Command Line Processor.C、The database user may be created using DB2 Control Center or DB2 Command Line Processor.D、The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.
考题
john has created a database library, librarians are responsible for adding new information to the db library. which one of the following minimum level of access he can grant the librarians of the db library?()A、 readerB、 authorC、 managerD、 designer
考题
Which one of the following provides the capability to partition the 3584 Tape Library into separatelogical libraries?()A、Control Path Failover B、Enhanced Frame Control C、Advanced Library Management System D、High Availability Library Control
考题
You are adding redo logs to the Oracle database. Creating a new redo log adds information to which of the following Oracle resources? ()A、Shared pool B、Control file C、SGA D、PGA
考题
You are analyzing how Oracle processes user statements. SQL and PL/SQL parse information is stored in which of the following database memory areas? ()A、Library cache B、Row cacheC、Dictionary cache D、Large area E、Buffer cache
考题
You are part of the DBA team working for a multinational bank. The team is responsible for performing administrative tasks on the database server located at the home office. The database server at the home office has a production database and a test database named TESTDB. The test database is primarily used for testing database commands and configuration settings befor implementing these settings on the production database. The test database is also used for the development of database applications. You have been asked by the senior DBA to grant the SYSDBA privilege to a new team member, John, so that he can perform some administrative tasks, such as shutdown and startup operations, on TESTDB. You use the password file to configure remote authentication on the TESTDB database. You execute the following statement to grant the SYSDBA privilege to John: SQLGRANT SYSDBA TO john; However, you receive the following error: ORA-01996: GRANT failed: password file ’c:/oracle/ora9i/dbs/testdb.pwd’ is full Which action should you take to add the user john to the password file without removing any of the existing users?()A、 Create another password file and then re-execute the GRANT statement.B、 Re-create the password file, specifying a larger number of allowed entries, and then re-execute the GRANT statement.C、 Change the value of the REMOTE_LOGIN_PASSWORDFILE initialization parameter in theinitialization parameter file to NONE and then re-execute the GRANT statement.D、 Change the value of the REMOTE_LOGIN_PASSWORDFILE initialization parameter in the initialization parameter file to SHARED and then re-execute the GRANT statement.
考题
Records from the data dictionary information are stored in which of the following database memory areas?()A、Library cache B、Row cache C、Session UGA D、Buffer cache
考题
A full backup of your database named DB1 is created automatically at midnight every day. Differential backups of DB1 occur twice each day at 10:00 and at 16:00. A database snapshot is created every day at noon. A developer reports that he accidentally dropped the Pricelist table in DB1 at 12:30. The last update to Pricelist occurred one week ago. You need to recover the Pricelist table. You want to achieve this goal by using the minimum amount of administrative effort. You must also minimize the amount of data that is lost. What should you do?()A、 Restore the most recent backup into a new database named DB1bak. Apply the most recent differential backup. Copy the Pricelist table from DB1bak to DB1. B、 Delete all database snapshots except the most recent one. Restore DB1 from the most recent database snapshot. C、 Recover DB1 from the most recent backup. Apply the most recent differential backup. D、 Copy the Pricelist table from the most recent database snapshot into DB1.
考题
单选题A new company has been given one public IP address. The company employs 200 users requiring Internet access from the headquarters. Which of the following can be implemented to provide Internet access for all the employees?()A
MulticastingB
Proxy serverC
NATD
Subnetting
考题
单选题You are part of the DBA team working for a multinational bank. The team is responsible for performing administrative tasks on the database server located at the home office. The database server at the home office has a production database and a test database named TESTDB. The test database is primarily used for testing database commands and configuration settings befor implementing these settings on the production database. The test database is also used for the development of database applications. You have been asked by the senior DBA to grant the SYSDBA privilege to a new team member, John, so that he can perform some administrative tasks, such as shutdown and startup operations, on TESTDB. You use the password file to configure remote authentication on the TESTDB database. You execute the following statement to grant the SYSDBA privilege to John: SQLGRANT SYSDBA TO john; However, you receive the following error: ORA-01996: GRANT failed: password file ’c:/oracle/ora9i/dbs/testdb.pwd’ is full Which action should you take to add the user john to the password file without removing any of the existing users?()A
Create another password file and then re-execute the GRANT statement.B
Re-create the password file, specifying a larger number of allowed entries, and then re-execute the GRANT statement.C
Change the value of the REMOTE_LOGIN_PASSWORDFILE initialization parameter in theinitialization parameter file to NONE and then re-execute the GRANT statement.D
Change the value of the REMOTE_LOGIN_PASSWORDFILE initialization parameter in the initialization parameter file to SHARED and then re-execute the GRANT statement.
考题
单选题You work as an application developer at Certkiller .com. Certkiller .com has been hired by a small local private school to develop a class library that will be used in an application named ManageAttendance for the purpose of managing student records.You are responsible for developing this class library. Certkiller .com has instructed you to create a collection in the application to store learners’ results. The school has informed you that they currently only have seven learners, but that this value will triple in the following year. Due to the limited resources, you need to ensure that the collection you create consumes a minimum amount of resources. What should you use to create the collection?()A
The HybridDictionary collection class.B
The HashTable collection class.C
The ListDictionary collection class.D
The StringCollection collection class.
考题
单选题Which one of the following provides the capability to partition the 3584 Tape Library into separatelogical libraries?()A
Control Path Failover B
Enhanced Frame Control C
Advanced Library Management System D
High Availability Library Control
考题
单选题john has created a database library, librarians are responsible for adding new information to the db library. which one of the following minimum level of access he can grant the librarians of the db library?()A
readerB
authorC
managerD
designer
考题
单选题An application that needs to use a shared library has a deployment descriptor that only specifies the Specification-Version and Extension-Name of the shared library. When the application is deployed, which shared library will be used?()A
The application will go into an ADMIN state and fail to deploy because the Implementation- Version is required.B
The application will be deployed but the classes in the shared library will not be available.C
If you are using the WebLogic Admin Console, you will be prompted for the version you want to use; otherwise, the application will fail to deploy.D
If there are multiple versions of the shared library deployed, WebLogic will use the one with the highest Implementation-Version.E
If there are multiple versions of the shared library deployed, WebLogic will use the one that was deployed most recently.
考题
单选题A full backup of your database named DB1 is created automatically at midnight every day. Differential backups of DB1 occur twice each day at 10:00 and at 16:00. A database snapshot is created every day at noon. A developer reports that he accidentally dropped the Pricelist table in DB1 at 12:30. The last update to Pricelist occurred one week ago. You need to recover the Pricelist table. You want to achieve this goal by using the minimum amount of administrative effort. You must also minimize the amount of data that is lost. What should you do?()A
Restore the most recent backup into a new database named DB1bak. Apply the most recent differential backup. Copy the Pricelist table from DB1bak to DB1. B
Delete all database snapshots except the most recent one. Restore DB1 from the most recent database snapshot. C
Recover DB1 from the most recent backup. Apply the most recent differential backup. D
Copy the Pricelist table from the most recent database snapshot into DB1.
考题
单选题You are adding redo logs to the Oracle database. Creating a new redo log adds information to which of the following Oracle resources? ()A
Shared pool B
Control file C
SGA D
PGA
考题
单选题An administrator is up grading the back up server from a single tape drive to a SCSI tape library. The library has been unpackaged, mounted, and the library drivers installed. Which of the following items should the administrator have to connect the device to the backup server?()A
SCSI cableB
SCSI interface adapter on the tape libraryC
SCSI termination card on the serverD
iSCSI cable
考题
单选题You are managing an Oracle Database 10g database that uses Oracle Managed Files (OMF). You enabled the block change tracking feature for the database. Which statement regarding the change tracking file is true?()A
One block change tracking file is created for each data file. By default, the file is created in DB_CREATE_FILE_DEST.B
One block change tracking file is created for each data file. By default, the file is created in BACKGROUND_DUMP_DEST.C
One block change tracking file is created for the database. By default, the file is created in DB_CREATE_FILE_DEST.D
One block change tracking file is created for the database. By default, the file is created in BACKGROUND_DUMP_DEST.
考题
单选题You have a server that runs Windows Server 2008. The server has the Windows SharePoint Services (WSS) server role installed. The server is configured to accept incoming e-mail. You create a new document library. You need to ensure that any user can send e-mail to the document library. What should you do?()A
Modify the RSS setting for the document library.B
Modify the permissions for the document library.C
Modify the incoming e-mail settings for the document library.D
Enable anonymous authentication for the Web application.
考题
单选题You are a systems administrator responsible for securing a Windows Server 2008 Web server. You havecreated a new Web site called Contoso Intranet that will contain seven Web applications. One of theapplication developers has told you that her Web application requires a new request handler that isprocessed using a .NET library her team created. How can you meet these requirements while also maximizing security for the server?()A
Add a new managed handler to the Contoso Intranet Web site.B
Add a new managed handler for the specific Web application that requires it.C
Add a new module mapping to the Contoso Intranet Web site.D
Add a new module mapping for the specific Web application that requires it.
考题
单选题Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A
The database user must be created using DB2 Control Center.B
The database user must be created using the DB2 Command Line Processor.C
The database user may be created using DB2 Control Center or DB2 Command Line Processor.D
The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.
考题
单选题A
They can buy new books.B
They can change to a computer system.C
They can change the librarians there.D
They can reprint all the cards.
热门标签
最新试卷