单选题These are points that describe the contents of different memory components:  1: Descriptive information or metadata about schema objects that are queried by using SQL statements  2: The run-time area for data manipulation language (DML) or data definition language (DDL) statements  3: Results of SQL queries and PL/SQL functions  4: Executable forms of SQL cursors, PL/SQL programs, and Java classes  5: The information necessary to reconstruct changes made to the database by a transaction  Which of these will be stored in theShared Poolif the necessary configurations are done()A1 and 2B2 and 5C1,3,and 4D3,4,and 5E1,2,3,and 4

单选题
These are points that describe the contents of different memory components:  1: Descriptive information or metadata about schema objects that are queried by using SQL statements  2: The run-time area for data manipulation language (DML) or data definition language (DDL) statements  3: Results of SQL queries and PL/SQL functions  4: Executable forms of SQL cursors, PL/SQL programs, and Java classes  5: The information necessary to reconstruct changes made to the database by a transaction  Which of these will be stored in theShared Poolif the necessary configurations are done()
A

1 and 2

B

2 and 5

C

1,3,and 4

D

3,4,and 5

E

1,2,3,and 4


参考解析

解析: 暂无解析

相关考题:

Which two client requests are captured during database replay Capture?() A. Flashback queriesB. Shared server requestsC. Login and logoff activities of sessionsD. Direct path load of data from external files by using utilities such as SQL *loaderE. Data definition language (DDL) and data manipulation language (DML) operations

Which two statements regarding the Flashback Table feature are correct?() A. Flashback Table can be performed on system tables.B. Flashback Table operation does not shrink the segments.C. Flashback Table uses log mining to extract SQL_REDO and SQL_UNDO statements.D. Flashback Table operation acquires exclusive data manipulation language (DML) locks.

Which two client requests are captured during database replay Capture?() (Choose two) A. Flashback queriesB. Shared server requestsC. Login and logoff activities of sessionsD. Direct path load of data from external files by using utilities such as SQL *loaderE. Data definition language (DDL) and data manipulation language (DML) operations

You discover that the schema changes that were recently made to your SQL Server 2005 database have caused your Web site to stop functioning. It is unclear who made the changes. TestKing.com now mandates that all changes to the database schema be tracked. You need to implement a mechanism that will track schema changes in your database.  What should you do?()A、Implement a stored procedure that writes data about schema changes to a log table.B、Implement DDL AFTER triggers that write user and schema information to a log table.C、Implement a DML INSTEAD OF trigger that writes data about schema changes to a log table.D、Implement a DML AFTER trigger that writes data about schema changes to a log table.

Which statement correctly describes SQL and /SQL*Plus?()A、Both SQL and /SQL*plus allow manipulation of values in the database.B、/SQL* Plus recognizes SQL satement and sends them to the server; SQL is the Oracle proprietary interface for executing SQL statements.C、/SQL* Plus language for communicating with the Oracle server to access data; SQL recognizes SQL statements and sends them to the server.D、/SQL manipulates data and table definition in the database; /SQL* Plus does not allow manipulation of values in the database.

ENCRYPT_TS is an encrypted tablespace that contains tables with data. Which statement is true regarding the effect of queries and data manipulation language (DML) statements on the encrypted data in the tables?()A、The data is decrypted during SORT and JOIN operations.B、The data remains encrypted when it is read into memory.C、The data remains encrypted when it is stored in the redo logs.D、The data remains encrypted in the UNDO tablespace provided that the UNDO tablespace was created with the encryption option enabled.

You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()A、by using triggersB、by using external tablesC、by using anonymous PL/SQL blocksD、by auditing all DML operations on the table

Which  statements are correct about temporary tables()A、Indexes and views can be created on temporary tables.B、Both the data and the structure of temporary tables can be exported.C、Temporary tables are always created in a user’s temporary tablespace.D、The data inserted into a temporary table in a session is available to other sessions.E、Data manipulation language (DML) locks are never acquired on the data of temporary tables

Observe the information in the columns:  1: The SGA     a. Text and parsed forms of all SQL statements  2: The cursor state   b. Run-time memory values for the SQL statement, such as rows retrieved  3: User-session data   c. Security and resource usage information  4:The stack space   d. Local variables for the process  Which option has the correct match between the memory areas and their contents()A、1-c,2-b,3-d,4-aB、1-c,2-b,3-c,4-aC、1-a,2-b,3-c,4-dD、1-a,2-b,3-d,4-c

What does the Metadata Application Programming Interface (API) allow you to do?()A、Repair damaged data dictionary entries.B、Delete data dictionary information about database objects you no longer need.C、Extract data definition commands from the data dictionary in a variety of formats.D、Prepare pseudocode modules for conversion to Java or PL/SQL programs with a Metadata code generator

Which two client requests are captured during database replay Capture?()A、 Flashback queriesB、 Shared server requestsC、 Login and logoff activities of sessionsD、 Direct path load of data from external files by using utilities such as SQL *loaderE、 Data definition language (DDL) and data manipulation language (DML) operations

Which two statements are true about simple views?()A、Views can be created as read only.B、Views are data segments like tables.C、Views can be created on the basis of more than one table.D、Data manipulation language (DML) operations cannot be performed on views.

Which two client requests are captured during database replay Capture?() (Choose two)A、Flashback queriesB、Shared server requestsC、Login and logoff activities of sessionsD、Direct path load of data from external files by using utilities such as SQL *loaderE、Data definition language (DDL) and data manipulation language (DML) operations

Which three statements are correct about temporary tables?()A、Indexes and views can be created on temporary tables.B、Both the data and the structure of temporary tables can be exported.C、Temporary tables are always created in a user’s temporary tablespace.D、The data inserted into a temporary table in a session is available to other sessions.E、Data manipulation language (DML) locks are never acquired on the data of temporary tables.

These are points that describe the contents of different memory components:  1: Descriptive information or metadata about schema objects that are queried by using SQL statements  2: The run-time area for data manipulation language (DML) or data definition language (DDL) statements  3: Results of SQL queries and PL/SQL functions  4: Executable forms of SQL cursors, PL/SQL programs, and Java classes  5: The information necessary to reconstruct changes made to the database by a transaction  Which of these will be stored in theShared Poolif the necessary configurations are done()A、1 and 2B、2 and 5C、1,3,and 4D、3,4,and 5E、1,2,3,and 4

You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()A、by using triggersB、by using Data PumpC、by using external tablesD、by using anonymous PL/SQL blocks

多选题Which two client requests are captured during database replay Capture?()AFlashback queriesBShared server requestsCLogin and logoff activities of sessionsDDirect path load of data from external files by using utilities such as SQL *loaderEData definition language (DDL) and data manipulation language (DML) operations

单选题ENCRYPT_TS is an encrypted tablespace that contains tables with data. Which statement is true regarding the effect of queries and data manipulation language (DML) statements on the encrypted data in the tables?()A The data is decrypted during SORT and JOIN operations.B The data remains encrypted when it is read into memory.C The data remains encrypted when it is stored in the redo logs.D The data remains encrypted in the UNDO tablespace provided that the UNDO tablespace was created with the encryption option enabled.

单选题What does the Metadata Application Programming Interface (API) allow you to do?()ARepair damaged data dictionary entries.BDelete data dictionary information about database objects you no longer need.CExtract data definition commands from the data dictionary in a variety of formats.DPrepare pseudocode modules for conversion to Java or PL/SQL programs with a Metadata code generator

多选题Which  statements are correct about temporary tables()AIndexes and views can be created on temporary tables.BBoth the data and the structure of temporary tables can be exported.CTemporary tables are always created in a user’s temporary tablespace.DThe data inserted into a temporary table in a session is available to other sessions.EData manipulation language (DML) locks are never acquired on the data of temporary tables

单选题Observe the information in the columns:  1: The SGA     a. Text and parsed forms of all SQL statements  2: The cursor state   b. Run-time memory values for the SQL statement, such as rows retrieved  3: User-session data   c. Security and resource usage information  4:The stack space   d. Local variables for the process  Which option has the correct match between the memory areas and their contents()A1-c,2-b,3-d,4-aB1-c,2-b,3-c,4-aC1-a,2-b,3-c,4-dD1-a,2-b,3-d,4-c

多选题Which three statements are correct about temporary tables?()AIndexes and views can be created on temporary tables.BBoth the data and the structure of temporary tables can be exported.CTemporary tables are always created in a user’s temporary tablespace.DThe data inserted into a temporary table in a session is available to other sessions.EData manipulation language (DML) locks are never acquired on the data of temporary tables.

单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()Aby using triggersBby using external tablesCby using anonymous PL/SQL blocksDby auditing all DML operations on the table

单选题You discover that the schema changes that were recently made to your SQL Server 2005 database have caused your Web site to stop functioning. It is unclear who made the changes. TestKing.com now mandates that all changes to the database schema be tracked. You need to implement a mechanism that will track schema changes in your database.  What should you do?()AImplement a stored procedure that writes data about schema changes to a log table.BImplement DDL AFTER triggers that write user and schema information to a log table.CImplement a DML INSTEAD OF trigger that writes data about schema changes to a log table.DImplement a DML AFTER trigger that writes data about schema changes to a log table.

单选题Which statement correctly describes SQL and /SQL*Plus?()ABoth SQL and /SQL*plus allow manipulation of values in the database.B/SQL* Plus recognizes SQL satement and sends them to the server; SQL is the Oracle proprietary interface for executing SQL statements.C/SQL* Plus language for communicating with the Oracle server to access data; SQL recognizes SQL statements and sends them to the server.D/SQL manipulates data and table definition in the database; /SQL* Plus does not allow manipulation of values in the database.

单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()Aby using triggersBby using Data PumpCby using external tablesDby using anonymous PL/SQL blocks

单选题These are points that describe the contents of different memory components:  1: Descriptive information or metadata about schema objects that are queried by using SQL statements  2: The run-time area for data manipulation language (DML) or data definition language (DDL) statements  3: Results of SQL queries and PL/SQL functions  4: Executable forms of SQL cursors, PL/SQL programs, and Java classes  5: The information necessary to reconstruct changes made to the database by a transaction  Which of these will be stored in theShared Poolif the necessary configurations are done()A1 and 2B2 and 5C1,3,and 4D3,4,and 5E1,2,3,and 4

多选题Which two client requests are captured during database replay Capture?() (Choose two)AFlashback queriesBShared server requestsCLogin and logoff activities of sessionsDDirect path load of data from external files by using utilities such as SQL *loaderEData definition language (DDL) and data manipulation language (DML) operations