Examine the following statement that is used to modify the constraint on the SALES table: SQL ALTER TABLE SALES MODIFY CONSTRAINT pk DISABLE VALIDATE; Which three statements are true regarding the above command()A、The constraint remains valid.B、The index on the constraint is dropped.C、It allows the loading of data into the table using SQL*Loader.D、New data conforms to the constraint, but existing data is not checkedE、It allows the data manipulation on the table using INSERT/UPDATE/DELETE SQL statements.
Examine the following statement that is used to modify the constraint on the SALES table: SQL> ALTER TABLE SALES MODIFY CONSTRAINT pk DISABLE VALIDATE; Which three statements are true regarding the above command()
- A、The constraint remains valid.
- B、The index on the constraint is dropped.
- C、It allows the loading of data into the table using SQL*Loader.
- D、New data conforms to the constraint, but existing data is not checked
- E、It allows the data manipulation on the table using INSERT/UPDATE/DELETE SQL statements.
相关考题:
View the Exhibit and examine the output.You execute the following RMAN command to perform the backup operation:What is the multiplexing level in the preceding backup process() A. 4B. 8C. 7D. 0
Examine the following commands and their output:View the exhibit and examine the Flashback Version Query that was executed after the preceding commands.What could be the possible cause for the query not displaying any row?()A. Flashback logging is not enabled for the database.B. The changes made to the table are not committed.C. Supplemental logging is not enabled for the database.D. The database is not configured in ARCHIVELOG mode.
Your multitenant container database (CDB) is running in ARCHIVELOG mode. You connect to the CDB RMAN.Examine the following command and its output:You execute the following command:RMAN BACKUP DATABASE PLUS ARCHIVELOG;Which data files will be backed up?()A. Data files that belong to only the root containerB. Data files that belong to the root container and all the pluggable databases (PDBs)C. Data files that belong to only the root container and PDB$SEEDD. Data files that belong to the root container and all the PDBs excluding PDB$SEED
Using network monitoring tools would allow an administrator to do which of the following?() A. Configure offline devicesB. Examine performance issuesC. Install additional software and updatesD. View syslog events
A user is unable to connect to the company‘s intranet server by FQDN, but can connect by IP address. Other users are not having a problem. An administrator verifies that the user can successfully ping the server by IP address and can properly resolve the FQDN using nslookup. The problem is persisting after running ipconfig /flushdns.Which of the following should the administrator do NEXT?()A. Examine the Imhost file.B. Flush the cache on the DNS server.C. Flush the cache on the WINS server.D. Examine the hosts file
Examine the following options, Multicasting supports applications that communicate.() A. many - to - oneB. one - to - oneC. one - to - manyD. many - to - many
This programme will examine the writer′s booksin detail, ______ an introduction to her life.A.following B.having followedC.being followed D.to be followed
You examine the port statistics on a Cisco Catalyst switch and notice an excessive number offrames are being dropped. Which of the following are possible reasons for the drops?()A、Unknown destination MAC addressB、Bad cablingC、MAC forwarding table is fullD、Port configured for half duplexE、Port configured for full duplexF、Network congestion
Examine the following options,which Spanning Tree Protocol (STP) protection mechanism disables aswitch port if the port receives a Bridge Protocol Data Unit (BPDU)?()A、Uplink FastB、Port FastC、BPDU GuardD、Root Guard
Which of the following is not considered a common approach to narrow the field of potentialproblem causes? (Choose the best answer.)()A、Following the traffic pathB、Top-downC、Comparing configurationsD、Bottom-upE、Divide and conquerF、Examine SLAs
A user is unable to connect to the company's intranet server by FQDN, but can connect by IP address. Other users are not having a problem. An administrator verifies that the user can successfully ping the server by IP address and can properly resolve the FQDN using nslookup. The problem is persisting after running ipconfig /flushdns. Which of the following should the administrator do NEXT?()A、Examine the Imhost file.B、Flush the cache on the DNS server.C、Flush the cache on the WINS server.D、Examine the hosts file
While applying a service update on a system using SMIT, the system administrates SMIT Command Status screen shows "Command: failed". Which of the following procedures should be performed to investigate the failure?()A、Exit the SMIT session and re-apply the update.B、Select the SMIT option to Clean UP After an Interrupted Installation.C、Examine the installation summary report to determine the cause of the failure.D、Examine the console log to view the error messages generated by the failure.
Examine the following options, Multicasting supports applications that communicate.()A、many - to - oneB、one - to - oneC、one - to - manyD、many - to - many
Which of the following commands should Karen, a technician, use to examine and restoreprotected system files?()A、SFCB、RECOVERC、REPLACED、COPY
To examine the Exhibit, press the Exhibit button. Which of the following addresses should be reachable without adding any routes?()A、129.35.57.22B、129.35.54.22C、129.35.58.22D、129.35.254.22
To examine the Exhibit, press the Exhibit button. Which of the following addresses will be reachable without adding any routes?()A、129.35.54.21B、129.35.57.21C、129.35.58.21D、129.35.55.21
Examine the following RMAN command: RMAN CONFIGURE ENCRYPTION FOR DATABASE ON; RMAN BACKUP DATABASE PLUS ARCHIVELOG; Which prerequisite must be met before accomplishing the backup?()A、 Provide a password for the encryptionB、 Set up an Oracle wallet for the encryptionC、 No setup is required as it is a default encryption methodD、 Both Oracle wallet and password must be set up for the encryption
Your alert log file has the following information: Tue May 25 17:43:38 2004 ORA-00060: Deadlock detected. More info in file /u01/app/oracle/admin/ORCL/udump/orcl_ora_3173.trc. What would you do to ensure that database is still running correctly?()A、examine the trace file and kill the session that caused the deadlockB、examine the trace file and kill both the sessions responsible for the deadlockC、examine the trace file for details and ask the user who caused the deadlock to roll back the transactionD、examine the trace file for details and remember that deadlocks are resolved automatically by Oracle databaseE、examine the trace file for details and use the Undo Advisor to rollback the transaction that caused the deadlock
单选题To examine the Exhibit, press the Exhibit button. Based on the output of the "netstat -p udp" command as shown in the exhibit, which of the following procedures should be performed?()A Increase the number of nfsd's on the client. B Increase the number of biod's on the client. C Decrease the number of nfsd's on the server. D Increase the size of nfs_socketsize on the server.
多选题You examine the port statistics on a Cisco Catalyst switch and notice an excessive number offrames are being dropped. Which of the following are possible reasons for the drops?()AUnknown destination MAC addressBBad cablingCMAC forwarding table is fullDPort configured for half duplexEPort configured for full duplexFNetwork congestion
单选题Examine the following options ,when editing global IPS settings, which one determines if the IOS- basedIPS feature will drop or permit traffic for a particular IPS signature engine while a new signature for thatengine is being compiled?()AEnable Signature DefaultBEnable Engine Fail ClosedCEnable Default IOS Signature ActualTests.comDEnable Fail Opened
单选题For visitors whose time is limited and are unable to learn the history and examine the building in detail on the spot, it is suggested that the following plan of a journey be followed.AwhoseBand are unableConDbe followed
多选题Examine the values for the following initialization parameters: FAST_START_MTTR_TARGET = 0LOG_CHECKPOINT_INTERVAL = 0 Which two will be the implications of these values in your database()AThe SGA advisor will be disabled.BThe MTTR advisor will be disabled.CAutomatic checkpoint tuning will be disabled.DCheckpoint information will not be written to the alert log file.
单选题Your multitenant container database (CDB) is running in ARCHIVELOG mode. You connect to the CDB RMAN. Examine the following command and its output: You execute the following command: RMAN BACKUP DATABASE PLUS ARCHIVELOG; Which data files will be backed up?()AData files that belong to only the root containerBData files that belong to the root container and all the pluggable databases (PDBs)CData files that belong to only the root container and PDB$SEEDDData files that belong to the root container and all the PDBs excluding PDB$SEED
单选题Examine the following commands executed in your database: SQL ALTER SESSION RECYCLEBIN=ON; Session altered SQL CREATE TABLE emp TABLESPACE tbsfd AS SELECT * FROM hr.employees; Table created. Further, you executed the following command to drop the table: SQL DROP TABLE emp;Table dropped. What happens in this scenario?()AThe table is moved to the SYSAUX tablespace.BThe table is moved to the SYSTEM tablespace.CThe table is removed from the database permanently.DThe table is renamed and remains in the TBSFD tablespace.
单选题Examine the following command: ALTER DISKGROUP data MOUNT FORCE; In which scenario can you use the above command to mount the disk group?()A when ASM disk goes offlineB when one or more ASM files are droppedC when some disks in a disk group are offlineD when some disks in a failure group for a disk group are rebalancing
单选题Examine the following command: ALTER DISKGROUP data MOUNT FORCE; In which scenario can you use the above command to mount the disk group? ()Awhen ASM disk goes offlineBwhen one or more ASM files are droppedCwhen some disks in a disk group are offlineDwhen some disks in a failure group for a disk group are rebalancing
单选题To examine the Exhibit, press the Exhibit button. Which of the following addresses should be reachable without adding any routes?()A129.35.57.22B129.35.54.22C129.35.58.22D129.35.254.22