多选题Which three statements describe the functionality of the DO_KEY built-in?()AIt accepts both a built-in and a key name as argument.BIf no key trigger is defined, the specified built-in executes.CIts parameter must be specified in upper case, enclosed in single quotation marks.DIt performs the same task as if you pressed the function key associated with the specified argument.EIt executes the key trigger that corresponds to the built-in specified as its parameter.

多选题
Which three statements describe the functionality of the DO_KEY built-in?()
A

It accepts both a built-in and a key name as argument.

B

If no key trigger is defined, the specified built-in executes.

C

Its parameter must be specified in upper case, enclosed in single quotation marks.

D

It performs the same task as if you pressed the function key associated with the specified argument.

E

It executes the key trigger that corresponds to the built-in specified as its parameter.


参考解析

解析: 暂无解析

相关考题:

Which of the following is a characteristic of a schema?() A.Foreign key references cannot cross schema boundaries.B.A DB2 user must be created before a schema with the same name can be created.C.If no schema is specified when an object is created, the default schema PUBLIC is used.D.A schema enables the creation of multiple objects in a database without encountering namespace collisions.

When a new trunk link is configured on an IOS based switch, which VLANs are allowed over the link()。 A.By default, all defined VLANs are allowed on the trunk.B.Each single VLAN, or VLAN range, must be specified with the switchport mode command.C.Each single VLAN, or VLAN range, must be specified with the vtp domain command.D.Each single VLAN, or VLAN range, must be specified with the vlan database command.

Which three statements are true about terms in a policy?()A、The order of the terms in a policy is irrelevantB、The action is specified in a then statementC、Ters are optional in a policyD、The match condition can be identified with a from statementE、Every policy must contain at least one term

While designing your database, you have created the EMPLOYEES table as an index-organized table (IOT). You want to create a bitmap index on the JOB_ID column to make queries faster. Which task must have been completed so that you are able to create the bitmap index?() A、A primary key must have been created.B、A mapping table must have been created.C、An overflow tablespace must have been specified.D、The PCTTHRESHOLD option must have been specified.

Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。A、It specifies use of a static encryption key that must be changed frequently to enhance securityB、It requires use of an open authentication methodC、It specifies the use of dynamic encryption keys that change each time a client establishes a connectionD、It requires that all access points and wireless devices use the same encryption keyE、It includes authentication by PSK

Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()A、It specifies use of a static encryption key that must be changed frequently to enhance security.B、It requires use of an open authentication method.C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection.D、It requires that all access points and wireless devices use the same encryption key.E、It includes authentication by PSK

Which of the following is a built-in feature of FAT?()A、 8.3 name conventionB、 Fault toleranceC、 EncryptionD、 Compression

Which of the following is a characteristic of a schema?()A、Foreign key references cannot cross schema boundaries.B、A DB2 user must be created before a schema with the same name can be created.C、If no schema is specified when an object is created, the default schema PUBLIC is used.D、A schema enables the creation of multiple objects in a database without encountering namespace collisions.

Which three statements describe the functionality of the DO_KEY built-in?()A、It accepts both a built-in and a key name as argument. B、If no key trigger is defined, the specified built-in executes. C、Its parameter must be specified in upper case, enclosed in single quotation marks. D、It performs the same task as if you pressed the function key associated with the specified argument. E、It executes the key trigger that corresponds to the built-in specified as its parameter.

Which three values are valid parameters for the DO_KEY built-in?()A、ENTER B、GO_ITEM C、VALIDATE D、EXIT_FORM E、EXECUTE_QUERY

While designing your database, you have created the EMPLOYEEStable as an index-organized (IOT). You want to create a bitmap index on the JOD_IDcolumn to make queries faster. Which task must have been completed so that you are able to create the bitmap index?()A、 A primary key must have been created.B、 A mapping table must have been created.C、 An overflow tablespace must have been specified.D、 The PCTTHRESHOLD option must have been specified.

Which statements are true regarding system-partitioned tables?()  A、 Only a single partitioning key column can be specified.B、 All DML statements must use partition-extended syntax.C、 The same physical attributes must be specified for each partition.D、 Unique local indexes cannot be created on a system-partitioned table.E、 Traditional partition pruning and partitionwise joins are not supported on these tables.

The telesales force requested additional ways to terminate the automated polling questionnaire. In addition to the default functionality, you provide a menu item and a button for this purpose. Adhering to efficient coding practices, which PL/SQL code do you use for the menu item and the button?()A、EXIT B、EXIT_FORM C、DO_KEY('Key-Exit') D、DO_KEY('EXIT_FORM')

Which value is valid for the iterate parameter in the CREATE_TIMER built-in function?()A、CYCLE B、ITERATEC、NO_REPEAT D、REUSE

You are responsible for managing a SQL Server 2005 database that stores sales information. Many values in nchar columns in the database tables contain preceding or trailing spaces. You need to implement a mechanism that selects the data from the tables without leading and trailing spaces. Your solution must be available for reuse in Transact-SQL statements and views. What should you do?()A、Create DML triggers that query the inserted and deleted tables.B、Create a stored procedure that calls the LTRIM and RTRIM built-in functions.C、Create a Transact-SQL function that calls the LTRIM and RTRIM built-in functions.D、Call the TRIM built-in function.

多选题Which three statements describe the functionality of the DO_KEY built-in?()AIt accepts both a built-in and a key name as argument.BIf no key trigger is defined, the specified built-in executes.CIts parameter must be specified in upper case, enclosed in single quotation marks.DIt performs the same task as if you pressed the function key associated with the specified argument.EIt executes the key trigger that corresponds to the built-in specified as its parameter.

单选题Which value is valid for the iterate parameter in the CREATE_TIMER built-in function?()ACYCLE BITERATECNO_REPEAT DREUSE

多选题Which three values are valid parameters for the DO_KEY built-in?()AENTERBGO_ITEMCVALIDATEDEXIT_FORMEEXECUTE_QUERY

多选题Identify two correct statements to complete the sentance. In a Coherence implementation, it is a best practice to implement PortableObject on all customer objects because:()Ait leverages Java’s built-in serializationBit provides a more efficient serialization of the objectCit allows the object to be shared across applicationsDit allows the object to be shared across programming platforms

多选题Which three statements are true about terms in a policy?()AThe order of the terms in a policy is irrelevantBThe action is specified in a then statementCTers are optional in a policyDThe match condition can be identified with a from statementEEvery policy must contain at least one term

单选题You want to create a temporary table while executing a procedure in a form. Which statement is true?()AYou cannot create a table form within Forms. BYou must use the FORMS_DDL built-in to create the table. CYou must use the DBMS_DYNAMIC_DDL package to create the table. DYou can write the CREATE TABLE statement directly into the trigger.

单选题Which of the following is a characteristic of a schema?()AForeign key references cannot cross schema boundaries.BA DB2 user must be created before a schema with the same name can be created.CIf no schema is specified when an object is created, the default schema PUBLIC is used.DA schema enables the creation of multiple objects in a database without encountering namespace collisions.

单选题Which value is valid for the iterate parameter in SET_TIMER built-in procedure? ()AREUSE BRECYCLE CNO_CHANGE DOCCURRENCE

单选题Which of the following is a built-in feature of FAT?()A 8.3 name conventionB Fault toleranceC EncryptionD Compression

多选题Which three built-ins can you use to navigate between forms invoked with the OPEN_FORM built-in? ()ACLOSE_FORMBNEXT_FORMCGO_FORMDPREVIOUS_FORM

多选题Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()AIt specifies use of a static encryption key that must be changed frequently to enhance security.BIt requires use of an open authentication method.CIt specifies the use of dynamic encryption keys that change each time a client establishes a connection.DIt requires that all access points and wireless devices use the same encryption key.EIt includes authentication by PSK

多选题Which statements are true regarding system-partitioned tables?()AOnly a single partitioning key column can be specified.BAll DML statements must use partition-extended syntax.CThe same physical attributes must be specified for each partition.DUnique local indexes cannot be created on a system-partitioned table.ETraditional partition pruning and partitionwise joins are not supported on these tables.

多选题Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。AIt specifies use of a static encryption key that must be changed frequently to enhance securityBIt requires use of an open authentication methodCIt specifies the use of dynamic encryption keys that change each time a client establishes a connectionDIt requires that all access points and wireless devices use the same encryption keyEIt includes authentication by PSK