单选题How does DB2 protect the integrity of indexes when data is updated?()ALocks are acquired on the data.BLocks are acquired on index keys.CLocks are acquired on index pages.DLocks are acquired on index pointers.

单选题
How does DB2 protect the integrity of indexes when data is updated?()
A

Locks are acquired on the data.

B

Locks are acquired on index keys.

C

Locks are acquired on index pages.

D

Locks are acquired on index pointers.


参考解析

解析: 暂无解析

相关考题:

How does she manage to keep her ________ when she eats so much? A.bodyB.figureC.stateD.line

—I’dlike to know______. —At 6: 30. A.when does your mother usuallycookbreakfastB.how your mother usually cooksbreakfastC.when your mother usually cooksbreakfastD.how does your mother usually cookbreakfast

- ()- It arrives by mail, I suppose. A、How does your remittance comeB、When will your remittance arriveC、From which country does your remittance come

When a host transmits data across a network to another host, which process does the data go through?() A.standardizationB.conversionC.encapsulationD.synchronization

Which option ensures that data is not modified in transit?()A、AuthorizationB、ConfidentialityC、AuthenticationD、Integrity

In which situations does the Oracle Data Pump use external tables and not the direct path load whileexporting a table()A、if a table is not in a clusterB、if a table has an active triggerC、if a table has an encryptedD、if a table has a column of data type LONG defined on itE、if a table has a referential integrity constraint defined on it

When does a transaction complete?()A、when a DELETE statement is executed B、when a ROLLBACK command is executed C、when a PL/SQL anonymous block is executed D、when a data definition language (DDL) statement is executed E、when a TRUNCATE statement is executed after the pending transact ion

()is not a physical wall, but a lot of virtual data to protect the computer network. A、Data wallB、Data ChannelC、Data baseD、firewall

How many users does the Cisco Unity Express Solution Support When installed in the Cisco 2800 Family?()A、120B、240C、48D、96

When a host transmits data across a network to another host, which process does the data go through?()A、standardizationB、conversionC、encapsulationD、synchronization

How does a controller-based access point configured to operate in sniffer mode behave?()A、allows client traffic, captures data on all channelsB、allows client traffic, captures data on a single channelC、allows no client traffic, captures data on all channelsD、allows no client traffic, captures data on a single channel

When executing the massload command to load catalog data into a WebSphere Commerce database on a remote DB2 server,which of the following can be used as valid values for the -method command line parameter?()A、createB、importC、loadD、sqlimportE、update

How does DB2 protect the integrity of indexes when data is updated?()A、Locks are acquired on the data.B、Locks are acquired on index keys.C、Locks are acquired on index pages.D、Locks are acquired on index pointers.

Which of the following best describes how locks are used in DB2?()A、To maintain control of updated rows for commit processingB、To ensure only committed changes are altered by another applicationC、To allow two applications to update the same row of data simultaneouslyD、To prevent multiple applications from accessing the same data simultaneously

Which parameter allows SQL*Loader to load data into a table with the indexes in the unusable state, prior to the load operation?()A、INDEXESB、SKIP_INDEXES_MAINTENANCEC、SKIP_UNUSABLE_INDEXESD、RESUMABLEE、INDEXES_UNUSABLE

单选题Which of the following tools can make recommendations for indexes and/or MQTs to improve the performance of DB2 applications?()ADesign AdvisorBVisual ExplainCPerformance AdvisorDConfiguration Assistant

单选题For years an acrimonious debate over how to protect heroin users impeded efforts in the U.S. to control the spread of AIDS.Aconvoluted Bbelied Cstoked Dencumbered

单选题Which of the following best describes how locks are used in DB2?()ATo maintain control of updated rows for commit processingBTo ensure only committed changes are altered by another applicationCTo allow two applications to update the same row of data simultaneouslyDTo prevent multiple applications from accessing the same data simultaneously

单选题How does a vessel’s rate of turn change when entering shallow water?()AIt is fasterBIt is slowerCThere is no changeDIt remains constant for varying propeller revolutions

单选题Your are the DBA supporting an Oracle 11g Release 2 database and wish to move a table containing several DATE, CHAR, VARCHAR2, and NUMBER data types, and the table’s indexes, to another tablespace. The table does not have a primary key and is used by an OLTP application. Which technique will move the table and indexes while maintaining the highest level of availability to the application?()AOracle Data Pump.BAn ALTER TABLE MOVE to move the table and ALTER INDEX REBUILD to move the indexes.CAn ALTER TABLE MOVE to move the table and ALTER INDEX REBUILD ONLINE to move the indexes.DOnline Table Redefinition.EEdition-Based Table Redefinition.

单选题When importing a table into a database,the import process performs these tasks:  1. Triggers are imported.  2. Data is imported.  3. New tables are created.  4. Indexes are built.  5. Any bitmap, functional, and/or domain indexes are built.  6. Integrity constraints are enabled on the new tables.  Which option shows the tasks in the order in which they are performed?()A2,3,4,1,6,5B3,2,4,1,6,5C3,2,6,4,1,5D4,2,3,1,5,6

多选题Which classes does the U.S. government place classified data into? ()ATop-secretBConfidentialCSBUDSecret

多选题In which situations does the Oracle Data Pump use external tables and not the direct path load whileexporting a table()Aif a table is not in a clusterBif a table has an active triggerCif a table has an encryptedDif a table has a column of data type LONG defined on itEif a table has a referential integrity constraint defined on it

单选题According to the Chemical Data Guide,what does ethyl chloride produce when ignited?()AToxic fumes of oxides of nitrogenBToxic fumes of leadCPoisonous phosgene gasDPoisonous chlorine gas

多选题When executing the massload command to load catalog data into a WebSphere Commerce database on a remote DB2 server,which of the following can be used as valid values for the -method command line parameter?()AcreateBimportCloadDsqlimportEupdate

单选题Context-Based Access Control (CBAC) is the algorithm of the Cisco IOS firewall feature. How does CBAC improve Teleworker security?()AInbound packets are permitted only if they are part of a legitimate data flow initiated by a device on the Teleworker home network.BAll packets are checked for integrity by analyzing their checksum.CEvery packet is checked to see if it was sent through the VPN tunnel.DEvery packet is inspected to see if any disallowed URLs are included. URLs are forwarded to the security cache engine for authorization.

单选题You have table 'apps','userdata' on server that uses MyISAM storage engine. You want to transfer this data to server but use InnoDB engine instead. You execute the following commands: ServerB commands: Shell> mysqldump –u root –h server –no-data apps userdata | mysql –u root –p apps Shell> mysql –u root –p –h server –e 'ALTER TABLE 'apps','userdata' ENGINE=InnoDB;' Shell> mysqldump –u root –p –h server –no-create-info –order-by-primary apps userdata | mysql –u root –p apps What effect does the – order-by-primary argument have on the mysqldump command?()AIt exports tables with the most indexes first to assist with import speedsBIt ensures that unique indexes have no conflicts when the data is dumpedCIt orders by primary key to assist in speeding up importing to InnoDB tablesDIt must be specified so index data is dumped correctly when –on-create-info is used

问答题How does Virginius feel when Browning’s poem became unpopular?