单选题Which describes the default behavior when you create a table? ()AThe table is accessible to all users.BTables are created in the public schema.CTables are created in your schema.DTables are created in the DBA schema.EYou must specify the schema when the table is created.

单选题
Which describes the default behavior when you create a table? ()
A

The table is accessible to all users.

B

Tables are created in the public schema.

C

Tables are created in your schema.

D

Tables are created in the DBA schema.

E

You must specify the schema when the table is created.


参考解析

解析: 暂无解析

相关考题:

Examine the statement: Create synonym emp for hr. employees; What happens when you issue the statement? () A. An error is generated.B. You will have two identical tables in the HR schema with different names.C. You create a table called employees in the HR schema based on you EMP table.D. You create an alternative name for the employees table in the HR schema in your own schema.

Which describes the default behavior when you create a table? () A. The table is accessible to all users.B. Tables are created in the public schema.C. Tables are created in your schema.D. Tables are created in the DBA schema.E. You must specify the schema when the table is created.

You created an encrypted tablespace:You then closed the encryption wallet because you were advised that this is secure.Later in the day, you attempt to create the EMPLOYEES table in the SECURESPACE tablespace with the SALT option on the EMPLOYEE column.Which is true about the result?()A. It creates the table successfully but does not encrypt any inserted data in the EMPNAME column because the wallet must be opened to encrypt columns with SALT.B. It generates an error when creating the table because the wallet is closed.C. It creates the table successfully, and encrypts any inserted data in the EMPNAME column because the wallet needs to be open only for tablespace creation.D. It generates error when creating the table, because the salt option cannot be used with encrypted tablespaces.

You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable.What should you do on the Junos Pulse Access Control Service to resolve this problem?()A. Delete the default auth table mapping policyB. Create auth table mapping policies that route users to specific resourcesC. Create Resource Access policies that permit access to specific resourcesD. Create Source Interface policies that route users to specific resources

You are designing an application for a telecom company and you have been asked to design a database table to facilitate monthly bill generation. The bill would include details of customer calls, listed in chronological order.  Which method would you follow to achieve this objective without increasing the overhead of sorting the rows?()A、create a hash cluster to store the dataB、create an index cluster to store the dataC、create a partitioned table to store the dataD、create a sorted hash cluster to store the dataE、create a heap table with rowid to store the data

You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable. What should you do on the Junos Pulse Access Control Service to resolve this problem?()A、Delete the default auth table mapping policyB、Create auth table mapping policies that route users to specific resourcesC、Create Resource Access policies that permit access to specific resourcesD、Create Source Interface policies that route users to specific resources

You navigate to "UAC" "Infranet Enforcer" "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()A、Dynamic auth table mapping is not enabled.B、A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.C、To create a static auth table mapping, you must delete the default policy.D、The default policy applies only to the factory-default role User.

In which scenario will you perform a cancel-based recovery?()A、 when a tablespace is dropped and you have only RMAN-based backup of the databaseB、 when a table is dropped and stored in the Recycle BinC、 when you are required to recover an existing table to its previous stateD、 when a tablespace is dropped and you have only a user-managed full backup of the database

In which scenario do you use the Flashback Database feature?()A、 when a table is dropped and you restore it from the Recycle BinB、 when a user’s schema is dropped and you recover the user’s schemaC、 when some incorrect data is inserted in the table and you retrieve the table to a state that was at a certain timestampD、 when a row of a table is updated frequently and committed, and you view all the versions of the row within a specific duration

In which scenario will you use the Flashback Transaction Query feature?()A、 when you want to restore an important table that is dropped from the Recycle BinB、 when you want to obtain the SQL statements to undo the deletion of some important records from a table by a transactionC、when you want to restore a dropped user’s schemaD、 when a row of a table is updated many times within a specific time period and you want all the versions of the row in the specified time period

In which scenario will you perform a user-managed incomplete recovery?()A、 when a table is dropped and stored in the Recycle BinB、when a table is dropped and purged from the Recycle BinC、 when you are required to recover an existing table to its previous stateD、 when you are required to view all the versions of a row of an existing table between a specific time period

In which scenario will you create a hash cluster?()A、 when you want the data to be returned automatically in chronological orderB、 if the application uses queries joining tables only occasionallyC、 if the queries against the clustered table use the equality operator (=) to retrieve the desired rowD、 if the full table scan is executed often on only one of the clustered tables

In which scenario will you perform an incomplete recovery?()A、 when a table is dropped and stored in the Recycle BinB、 when all the control files are deletedC、 when a member of a multiplexed redo log group is droppedD、 when you are required to recover a table to its previous state

When setting up the Flashback Data Archive, which of these key parameters are required?()A、 Tablespace nameB、 Storage quotaC、 RetentionD、 Table nameE、 Create a default archive

In which situation are you NOT required to perform an incomplete recovery?()A、 when all the control files are lostB、 when all the members of a redo log group are lostC、 when a table is dropped and purged from the Recycle BinD、 when a temporary file of the default temporary tablespace is lost

You are responsible for managing the database schema for an order entry application in a SQL Server 2005 database. After a design review, a member of the development staff asks you to add a new column named CommissionRate to the Product table. Because the actual commission rates for all products are not known at this time, each product has a default commission rate of 12 percent. The rate can be modified as necessary. You add the new column. You need to configure the table to assign the default value as efficiently as possible. What should you do?()A、 Create an INSERT trigger to assign the default value to each item in the table. B、 Create a CHECK constraint to validate the data and to assign the default value to each item in the table. C、 Create an UPDATE trigger to update the default value for each new item in the table. D、 Create a DEFAULT constraint to assign the default value specifying the WITH VALUES argument.

Given the following requirements:Create a table named TESTTAB, which has an identity column named ACTIVITYNO. Define the identity column to generate the values for the column by default. Start the values at 10 and increment by 10. Make the identity column unique. Which of the following CREATE statements will successfully create this table?()A、CREATE TABLE TESTTAB (ACTIVITYNO SMALLINT NOT NULL GENERATED ALWAYS AS IDENTITY (START WITH 10 INCREMENT BY 10), ACTKWD CHAR(6) NOT NULL, ACTDESC VARCHAR(20) NOT NULL, UNIQUE(ACTIVITYNO))B、CREATE TABLE TESTTAB (ACTIVITYNO SMALLINT NOT NULL GENERATED ALWAYS AS IDENTITY (START WITH 1 INCREMENT BY 10), ACTKWD CHAR(6) NOT NULL, ACTDESC VARCHAR(20) NOT NULL, UNIQUE(ACTNO))C、CREATE TABLE TESTTAB (ACTIVITYNO SMALLINT NOT NULL GENERATED BY DEFAULT AS IDENTITY (START WITH 10 INCREMENT BY 1), ACTKWD CHAR(6) NOT NULL, ACTDESC VARCHAR(20) NOT NULL, UNIQUE(ACTIVITYNO))D、CREATE TABLE TESTTAB (ACTIVITYNO SMALLINT NOT NULL GENERATED BY DEFAULT AS IDENTITY (START WITH 10 INCREMENT BY 10), ACTKWD CHAR(6) NOT NULL, ACTDESC VARCHAR(20) NOT NULL, UNIQUE(ACTIVITYNO))

单选题In which scenario do you use the Flashback Database feature?()A when a table is dropped and you restore it from the Recycle BinB when a user’s schema is dropped and you recover the user’s schemaC when some incorrect data is inserted in the table and you retrieve the table to a state that was at a certain timestampD when a row of a table is updated frequently and committed, and you view all the versions of the row within a specific duration

单选题While creating a database using Database Configuration Assistant tool, you created a database default temporary tablespace. Which activity would cause the default temporary tablespace of the database to be used?()Athe CREATE TABLE .. commandBsorting of the SYSTEM tablespace’s dataCsorting of data required by recursive SQL statementsDthe CREATE TABLE .. ORGANIZATION EXTERNAL .. commandEsorting of data if the users have not been allocated temporary tablespace explicitlyFsorting of data if the users have been allocated temporary tablespace explicitly

单选题In which scenario will you perform a user-managed incomplete recovery?()A when a table is dropped and stored in the Recycle BinBwhen a table is dropped and purged from the Recycle BinC when you are required to recover an existing table to its previous stateD when you are required to view all the versions of a row of an existing table between a specific time period

单选题In which scenario will you create a hash cluster?()A when you want the data to be returned automatically in chronological orderB if the application uses queries joining tables only occasionallyC if the queries against the clustered table use the equality operator (=) to retrieve the desired rowD if the full table scan is executed often on only one of the clustered tables

单选题You navigate to "UAC" "Infranet Enforcer" "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()ADynamic auth table mapping is not enabled.BA successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.CTo create a static auth table mapping, you must delete the default policy.DThe default policy applies only to the factory-default role User.

单选题In your test database, you have created the ORDERS table as an index-organized table (IOT). To facilitate faster querying, you have created a mapping table and a bitmap index on the ORDER_FILLED column. You observe that the query performance degrades when users perform a large volume of transactions.  While investigating the reason, you find that the mapping table segment is fragmented, leading to poor performance.   Which option would you use to defragment the mapping table without affecting the original table data?()Aexport and import the mapping tableBdrop and re-create the mapping tableCtruncate the mapping table and reinsert the valuesDuse the ALTER TABLE···REBUILD command to defragment the mapping table

单选题In which scenario will you perform an incomplete recovery?()A when a table is dropped and stored in the Recycle BinB when all the control files are deletedC when a member of a multiplexed redo log group is droppedD when you are required to recover a table to its previous state

单选题You want to create a temporary table while executing a procedure in a form. Which statement is true?()AYou cannot create a table form within Forms. BYou must use the FORMS_DDL built-in to create the table. CYou must use the DBMS_DYNAMIC_DDL package to create the table. DYou can write the CREATE TABLE statement directly into the trigger.

单选题In which situation are you NOT required to perform an incomplete recovery?()A when all the control files are lostB when all the members of a redo log group are lostC when a table is dropped and purged from the Recycle BinD when a temporary file of the default temporary tablespace is lost

单选题In which scenario will you create a sorted hash cluster? ()A if the application uses queries joining tables only occasionallyB if the full table scan is executed often on only one table of the clustered tablesC if the data for all the rows of a cluster key value exceeds one or two Oracle blocksD when you want the data to be returned automatically in the chronological order