单选题You are the DBA for an academic database. You need to create a role that allows a group of users to modify existing rows in the STUDENT_GRADES table. Which set of statements accomplishes this? ()ACREATE ROLL registrar; GRANT MODIFY ON student_grant TO registrar; GRANT registrar to user 1, user2, user3BCREATE NEW ROLE registrar; GRANT ALL ON student_grant TO registrar; GRANT registrar to user 1, user2, user3CCREATE ROLL registrar; GRANT UPDATE ON student_grant TO registrar; GRANT ROLE to user1, user2, user3DCREATE ROLL registrar; GRANT UPDATE ON student_grant TO registrar; GRANT registrar to user 1, user2, user3;ECREATE registrar; GRANT CHANGE ON student_grant TO registrar; GRANT registrar;

单选题
You are the DBA for an academic database. You need to create a role that allows a group of users to modify existing rows in the STUDENT_GRADES table. Which set of statements accomplishes this? ()
A

CREATE ROLL registrar; GRANT MODIFY ON student_grant TO registrar; GRANT registrar to user 1, user2, user3

B

CREATE NEW ROLE registrar; GRANT ALL ON student_grant TO registrar; GRANT registrar to user 1, user2, user3

C

CREATE ROLL registrar; GRANT UPDATE ON student_grant TO registrar; GRANT ROLE to user1, user2, user3

D

CREATE ROLL registrar; GRANT UPDATE ON student_grant TO registrar; GRANT registrar to user 1, user2, user3;

E

CREATE registrar; GRANT CHANGE ON student_grant TO registrar; GRANT registrar;


参考解析

解析: 暂无解析

相关考题:

You would like to create a custom performance counter for an application that you created recently.To do this, you decide to create a custom category named ApplicationPerformance and a performance counter named HitNumber.You need to ensure that this counter is shared across numerous applications.What should you do?()A.B.C.D.

You create a Web application. The Web application enables users to change fields in their personal profiles. Some of the changes are not persisting in the database. You need to raise a custom event to track each change that is made to a user profile so that you can locate the error.Which event should you use? ()A. WebAuditEventB. WebEventManagerC. WebBaseEventD. WebRequestEvent

You are the DBA for an academic database. You need to create a role that allows a group of users to modify existing rows in the STUDENT_GRADES table. Which set of statements accomplishes this? () A. CREATE ROLL registrar; GRANT MODIFY ON student_grant TO registrar; GRANT registrar to user 1, user2, user3B. CREATE NEW ROLE registrar; GRANT ALL ON student_grant TO registrar; GRANT registrar to user 1, user2, user3C. CREATE ROLL registrar; GRANT UPDATE ON student_grant TO registrar; GRANT ROLE to user1, user2, user3D. CREATE ROLL registrar; GRANT UPDATE ON student_grant TO registrar; GRANT registrar to user 1, user2, user3;E. CREATE registrar; GRANT CHANGE ON student_grant TO registrar; GRANT registrar;

You are planning to import customer data from the Customer table and the Country table in your SQL Server 2000 database into a SQL Server 2005 database. You want to ensure that during the import process,each value in the CountryCode column of the Customer table has a corresponding record in the CountryCode column in the Country table of the SQL Server 2005 database. You define a foreign key between these two tables. Thus,referential integrity will guarantee that the import routine fails if there are any records where a CountryCode value does not exist in the Country table but does exist in the Customer table. You need to ensure that the import process does not fail if records are encountered that do not exist in the Country table. What should you do?()A、Drop the foreign key. Import the data by using the script. Re-create the foreign key.B、Create a CHECK constraint.C、Create a DML INSTEAD OF trigger that writes the failed records to a file or table.D、Create a DML AFTER trigger that writes the failed records to a file or table.

You need to design a configuration for Exchange Server storage that meets the business and technical requirements. What should you do?()A、Create a single storage group. Create one database for all usersB、Create two storage groups. In each storage group, create one database. Place mailboxes for remote users in one storage group database, and place all other mailboxes in the other storage group databaseC、Create two storage groups. In each storage group, create one database. Place executive mailboxes in one storage group database, and place all other mailboxes in the other storage group databaseD、Create two storage groups. In one storage group, create a database, and place all mailboxes for remote users and executives in the database. In the other storage group, create a database for all other mailboxes

You are responsible for maintaining a SQL Server 2005 database. Business analysts in the company routinely use a view named v CustomerSales to join the Customers and Sales tables in the database. They use the view to aggregate total sales by customer by month. You need to increase the performance of the view. What should you do?()A、Update the view to use an outer join between the Customers and Sales tables.B、Create a clustered index on the v CustomerSales view.C、Create two separate views that do not contain any joinsone view named Customers for the Customers table and another one named v Sales for the Sales table.D、Create a stored procedure for the business analysts that uses the v CustomerSales view.

Your database runs in NOARCHIVELOG mode, and is backed up every night using RMAN scripts. However, last night your assistant DBA performed a manual operating system backup, instead of running the scripts. Today your database crashed and you now want to use the backups from last night. What do you need todo?()A、You need to perform the restore and recover operations manually, because the backup was made manually. B、First you need to resynchronize the catalog with the control file, and then you can use RMAN to recover the database. C、First you need to add the backup to the catalog using the CATALOG command, and then you can use RMAN to recover the database. D、You can just use RMAN and recover the database, because RMAN automatically updates the catalog with the backup information.

You need to maintain a record of all transactions on some tables for at least three years. Automatic undo management is enabled for the database. What must you do accomplish this task?()A、 Enable supplemental logging for the database.B、 Specify undo retention guarantee for the databaseC、 Create Flashback Data Archive in the tablespace where the tables are stored.D、 Create Flashback Data Archive and enable Flashback Data Archive for specific tables

You lost the index tablespace in your database. You decided to re-create the index tablespace and the indexes in the tablespace. What methods can you use to re-create the indexes?()A、 SQL scriptsB、 Recovery Manager (RMAN) scriptC、 Data PumpD、 SQL*LoaderE、 Flashback database

You executed the following procedure to collect statistics regarding an index:       SQLANALYZE INDEX EMP_ID VALIDATE STRUCTURE;   Which view will you use to determine whether you need to rebuild the index or not?() A、 INDEX_STATSB、 DBA_INDEXESC、 DBA_IND_COLUMNSD、 V$OBJECT_USAGE

You are working as a DBA on the decision support system. There is a business requirement to track and store all transactions for at least three years for a few tables in the database. Automatic undo management is enabled in the database.  Which configuration should you use to accomplish this task?()A、 Enable Flashback Data Archive for the tables.B、 Specify undo retention guarantee for the database.C、 Enable supplemental logging for the database.D、 Query V$UNDOSTAT to determine the amount of undo that will be generated and create an undo tablespace for that size.E、 Create Flashback Data Archive on the tablespace on which the tables are stored.

You have lost all your database control files. To recover them, you are going to use the results of the alter database backup controlfile to trace command. Your datafiles and your online redo logs are all intact.  Which of the following is true regarding your recovery?()  A、 You will need to open the database with the resetlogs command.B、 All you need to do is execute the trace file from SQL*Plus and it will perform the recovery for you.C、 You will use the resetlogs version of the create controlfile command.D、 You will use the noresetlogs version of the create controlfile command.E、 You will use the trace file to create a backup control file, and then you will recover the database with the recover database using backup controlfile command

You are a network administrator for The network contains a Windows Server 2003 computer named Testking1. You need to install an application on Testking1. The installation will cause several changes to the registry. You plan to use the Backup utility to create a backup that will enable you to restore the registry. TestKing requirements for network management state that all backups must be performed during an eight-hour period at night. Because of this time constraint, you need to ensure that the backup can be recovered as quickly as possible. You need to create a backup that meets the requirements. What should you do?()A、Create a backup of the system partition.B、Create a backup of the boot partition.C、Create a backup of the System State.D、Create an Automated System Recovery (ASR) backup.E、Create a backup of the Systemroot/System32/Config folder.

You create a Web application. The Web application enables users to change fields in their personal profiles. Some of the changes are not persisting in the database. You need to raise a custom event to track each change that is made to a user profile so that you can locate the error. Which event should you use?()A、WebAuditEventB、WebEventManagerC、WebBaseEventD、WebRequestEvent

Your company uses a SQL Server 2005 database. Customer data from your trading partners is imported into the Customers table every night. You need to ensure that the customer record is updated if it already exists in the Customers table. If the record does not exist, the data needs to be inserted into the Customers table. What should you do?()A、 Create a FOR trigger. B、 Create an INSTEAD OF trigger. C、 Create an AFTER trigger. D、 Create a DDL trigger.

You are creating a view to join the Customers and Orders tables in a SQL Server 2005 database. You need to ensure that the view cannot be affected by modifications to underlying table schemas. You want to accomplish this goal by using the least possible amount of overhead. What should you do?()A、Create CHECK constraints on the tables. B、Create a DDL trigger to roll back any changes to the tables if the changes affect the columns in the view. C、Create the view, specifying the WITH SCHEMABINDING option. D、Create the view, specifying the WITH CHECK option.

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. You are going to use the data collector to gather performance data periodically on all instances. You must store all collected data in the same database. This database is hosted on a single instance. Every five hours, you have to collect and load performance data in the management data warehouse. Which data collection process should you implement? () A、You should create a cached data collection B、You should create an on-demand non-cached data collection C、You should create a scheduled non-cached data collection. D、You should create two different SQL Agent jobs. The two jobs are scheduled at the same time. One job uploads the data collection and the other job creates a data collection.

You need to implement an authentication method on SQL4. The TravelOnline database will be accessed through a Web services application. You need to make the authentication method as secure as possible.What should you do?()A、Create an HTTP endpoint with NTLM authentication, and create a service principal name (SPN).B、Create an HTTP endpoint with digest authentication, and create a service principal name (SPN).C、Create an HTTP endpoint with integrated authentication, and create a service principal name (SPN).D、Create an HTTP endpoint with Kerberos authentication.

单选题Your company uses a SQL Server 2005 database. Customer data from your trading partners is imported into the Customers table every night. You need to ensure that the customer record is updated if it already exists in the Customers table. If the record does not exist, the data needs to be inserted into the Customers table. What should you do?()A Create a FOR trigger. B Create an INSTEAD OF trigger. C Create an AFTER trigger. D Create a DDL trigger.

单选题You are working as a DBA on the decision support system. There is a business requirement to track and store all transactions for at least three years for a few tables in the database. Automatic undo management is enabled in the database.  Which configuration should you use to accomplish this task?()A Enable Flashback Data Archive for the tables.B Specify undo retention guarantee for the database.C Enable supplemental logging for the database.D Query V$UNDOSTAT to determine the amount of undo that will be generated and create an undo tablespace for that size.E Create Flashback Data Archive on the tablespace on which the tables are stored.

单选题You executed the following procedure to collect statistics regarding an index:       SQLANALYZE INDEX EMP_ID VALIDATE STRUCTURE;   Which view will you use to determine whether you need to rebuild the index or not?()A INDEX_STATSB DBA_INDEXESC DBA_IND_COLUMNSD V$OBJECT_USAGE

多选题You have a single Active Directory directory service forest named contoso.com. You create baseline  security settings for a group of computers, and you store the settings in a database. You deploy thebaseline security settings. You need to confirm that the security settings on one of the computers are  applied correctly.  What are two possible commands that you can run to achieve this goal?()AseceditBgpupdateCnetdomDscwcmd

单选题Your database runs in NOARCHIVELOG mode, and is backed up every night using RMAN scripts. However, last night your assistant DBA performed a manual operating system backup, instead of running the scripts. Today your database crashed and you now want to use the backups from last night. What do you need todo?()AYou need to perform the restore and recover operations manually, because the backup was made manually. BFirst you need to resynchronize the catalog with the control file, and then you can use RMAN to recover the database. CFirst you need to add the backup to the catalog using the CATALOG command, and then you can use RMAN to recover the database. DYou can just use RMAN and recover the database, because RMAN automatically updates the catalog with the backup information.

多选题You lost the index tablespace in your database. You decided to re-create the index tablespace and the indexes in the tablespace. What methods can you use to re-create the indexes?()ASQL scriptsBRecovery Manager (RMAN) scriptCData PumpDSQL*LoaderEFlashback database

单选题You have an Exchange Server 2010 organization.You plan to enable Federated Sharing.You need to create a DNS record to store the Application Identifier (AppID) of the domain for the federated trust. Which type of record should you create?()AABCNAMECSRVDTXT

单选题You need to create a class definition that is interoperable along with COM.You need to ensure that COM applications can create instances of the class and can call the GetAddress method. Which code segment should you use?()A AB BC CD D

单选题You need to maintain a record of all transactions on some tables for at least three years. Automatic undo management is enabled for the database. What must you do accomplish this task?()A Enable supplemental logging for the database.B Specify undo retention guarantee for the databaseC Create Flashback Data Archive in the tablespace where the tables are stored.D Create Flashback Data Archive and enable Flashback Data Archive for specific tables

单选题You need to design a configuration for Exchange Server storage that meets the business and technical requirements. What should you do?()ACreate a single storage group. Create one database for all usersBCreate two storage groups. In each storage group, create one database. Place mailboxes for remote users in one storage group database, and place all other mailboxes in the other storage group databaseCCreate two storage groups. In each storage group, create one database. Place executive mailboxes in one storage group database, and place all other mailboxes in the other storage group databaseDCreate two storage groups. In one storage group, create a database, and place all mailboxes for remote users and executives in the database. In the other storage group, create a database for all other mailboxes