数据库应用系统(DataBase Application System,DBAS)是一个使用了数据库技术的应用软件系统。

数据库应用系统(DataBase Application System,DBAS)是一个使用了数据库技术的应用软件系统。


相关考题:

Which correctly describes the tiers of the Oracle Workflow architecture?() A. Oracle Database tier and Application server tier onlyB. Oracle Database tier, Application server tier, and End-user client tier onlyC. Oracle Database tier, Application server tier, and Development client tier onlyD. Oracle Database tier, Application server tier, Development client tier, and End-user client tier

Which tier in Oracle E-Business Suite is responsible for storing application data?() A.database tierB.application tierC.client (desktop) tierD.both database tier and application tier

You enabled an audit policy by issuing the following statements:SQL AUDIT POLICY ORA_DATABASE_PARAMETER BY SCOTT;SQL AUDIT POLICY ORA_DATABASE_PARAMETER BY SYS, SYSTEM;For which database users and for which executions is the audit policy now active? ()A. SYS, SYSTEMB. SCOTTC. Only for successful executionsD. Only for failed executionsE. Both successful and failed executions

You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements:SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT;For which database users is the audit policy now active?()A. All users except SYSB. All users except SCOTTC. All users except sys and SCOTTD. All users except sys, system, and SCOTT

ODBC(Open Database Connectivity,())是Microsoft公司开发的一套开放的数据库系统(),它为应用程序提供了一组对数据库访问的标准()和基于()的运行支撑环境。

下列数据库中,属于SQL server系统数据库的是()数据库。A、NORTHWINDB、TEMPDBC、PUBSD、SYS-DB

下列选项中,表示数据库管理系统的英文名称是()A、DatabaseB、Database Management SystemC、Database SystemD、Database DB

SQL Server数据库提供的错误信息如何查看?()A、查看系统视图sys.database_filesB、查看系统视图sys.statsC、查看系统视图sys.errorD、查看系统视图sys.messages

A user has an application server LPAR with a physical Ethernet adapter. They want to have a database LPAR also connected to the application LPAR via virtual Ethernet. Their security policies require a firewall between the application LPAR and database LPAR. Which of the following virtual Ethernet configurations satisfies the customer’s requirements?()A、The application server,firewall,and database server on the same VLANB、The application server and firewall on one VLAN,and the database server on a second VLANC、The application server on one VLAN,and the database server and firewall on a second VLAND、The application server and firewall on one VLAN,and the firewall and database server on a second VLAN

You enabled an audit policy by issuing the following statements: SQL AUDIT POLICY ORA_DATABASE_PARAMETER BY SCOTT; SQL AUDIT POLICY ORA_DATABASE_PARAMETER BY SYS, SYSTEM; For which database users and for which executions is the audit policy now active? ()A、SYS, SYSTEMB、SCOTTC、Only for successful executionsD、Only for failed executionsE、Both successful and failed executions

You want to implement the backup and recovery strategy in your database using Recovery Manager (RMAN). You have chosen the control file of the target database for the RMAN repository.  Which command-line RMAN command would you use to establish a local connection between RMAN and the RMAN repository if your database is using password file authentication?()A、 rman TARGET / NOCATALOGB、 rman TARGET sys/passwordC、 rman TARGET sys/password AS SYSDBAD、 rman TARGET sys/password@db_name CATALOG rman_user/rman_password@rcat

You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements: SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM; SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT; For which database users is the audit policy now active?()A、All users except SYSB、All users except SCOTTC、All users except sys and SCOTTD、All users except sys, system, and SCOTT

You are a database administrator for your company. The company uses a vendor company’s application that is based on a proprietary database. You query data from the application database and import the data into a SQL Server 2005 database. The application vendor provides you with a new OLE DB driver to be used when querying the application database. Company policy prohibits connections between the SQL Server database and the application database, except when querying this data. You need to provide a way to query data from the application database. What should you?()A、Configure a Linked Server connection to the application database.B、Write a query that uses an OPENDATASOURCE command.C、Write a query that uses an OPENQUERY command.D、Configure a Remote Server connection to the application database.

In a two-tier configuration, it is recommended to put which of the following components on different nodes?()A、Database client and database serverB、WebSphere Application Server and Database ServerC、WebSphere Commerce Server and WebSphere Application ServerD、Web server and WebSphere Application Server

he DBA is about to enable auditing on the Oracle database in an attempt to discover some suspicious activity. Audit trail information is stored in which of the following database object names?()A、SYS.SOURCE$ B、SYS.AUD$ C、DBA_SOURCE D、DBA_AUDIT_TRAIL

多选题In a two-tier configuration, it is recommended to put which of the following components on different nodes?()ADatabase client and database serverBWebSphere Application Server and Database ServerCWebSphere Commerce Server and WebSphere Application ServerDWeb server and WebSphere Application Server

单选题Which components are installed on the middle tier in a WebSphere Commerce V 5.6 three-tier configuration (i.e. in a three-node topology)?()AWebSphere Commerce Server, WebSphere Application Server and Web server pluginBWebSphere Application Server, Database Client and Web server pluginCWebSphere Commerce Server, Database Server and WebSphere Application ServerDWebSphere Commerce Server, WebSphere Application Server and Database ClientEWeb server, WebSphere Commerce Server and WebSphere Application Server

单选题You are managing the APPPROD database as a DBA which is not using the Oracle-managed files. You plan to duplicate this database in the same system with the name DUPDB.You want to create the same directory structure for duplicate database files as of the target database. You executed the following RMAN commands:   RMAN CONNECT TARGET sys/sys@APPPROD RMAN CONNECT AUXILIARY sys/sys@DUPDB RMAN DUPLICATE TARGET DATABASE TO dupdb  FROM ACTIVE DATABASE PASSWORD FILE SPILE  NOFILENAMECHECK;   What are the implications of this command?()A It creates database files for the duplicate database under the Oracle base with a different directory for the duplicate database.B It overwrites data files of the target database because a different location for data files is not mentioned for the duplicate database.C It creates database files for the duplicate database under the same Oracle home as that of the target database with the same directory structure.D It creates database files for the duplicate database under the same Oracle home as that of the target but with a different directory for the duplicate database.

单选题You want to implement the backup and recovery strategy in your database using Recovery Manager (RMAN). You have chosen the control file of the target database for the RMAN repository.  Which command-line RMAN command would you use to establish a local connection between RMAN and the RMAN repository if your database is using password file authentication?()A rman TARGET / NOCATALOGB rman TARGET sys/passwordC rman TARGET sys/password AS SYSDBAD rman TARGET sys/password@db_name CATALOG rman_user/rman_password@rcat

单选题A user has an application server LPAR with a physical Ethernet adapter. They want to have a database LPAR also connected to the application LPAR via virtual Ethernet. Their security policies require a firewall between the application LPAR and database LPAR. Which of the following virtual Ethernet configurations satisfies the customer’s requirements?()AThe application server,firewall,and database server on the same VLANBThe application server and firewall on one VLAN,and the database server on a second VLANCThe application server on one VLAN,and the database server and firewall on a second VLANDThe application server and firewall on one VLAN,and the firewall and database server on a second VLAN

单选题You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. A vendor company’s application is utilized, and the application is based on a proprietary database. Data is queried from the application database and the data is imported into a SQL Server 2005 database. A new OLE DB driver is offered by the application vendor, and the new OLE DB driver will be utilized when the application database is queried. According the company requirements, the connections between the SQL Server database and the application database is prohibited, except when this data is queried. You should think out a method to have data queried from the application database.  Which action should be performed to achieve the goal?()ATo achieve the goal, a Linked Server connection should be configured to the application database.BTo achieve the goal, a query should be written, and an OPENQUERY command is utilized by the query.CTo achieve the goal, a Remote Server connection to the application database should be configured.DTo achieve the goal, a query should be written, and an OPENDATASOURCE command is utilized by the query.

单选题You create a Microsoft ASP.NET AJAX application by using the Microsoft .NET Framework version 3.5.  You attach Microsoft Visual Studio 2008 debugger to the Microsoft Internet Explorer instance to debug the JavaScript code in the AJAX application.  You need to ensure that the application displays the details of the client-side object on the debugger console.  What should you do?()AUse the Sys.Debug.fail method.BUse the Sys.Debug.trace method.CUse the Sys.Debug.assert method.DUse the Sys.Debug.traceDump method.

单选题You are the administrator of a Microsoft Windows Server 2003 computer named Server1. SQL Server 2005 is installed on Server1 to host a database named MedDB. The MedDB database serves as the backend database for a new client/server application named MedDATA. Installation of the MedDATA application creates the database schema, application roles, and administrative accounts. It also sets all of the default permissions. You need to establish a permissions baseline for all objects in the MedDB database.  What should you do?()AUse the SQL Server 2005 Management Studio to review the permissions of the default database objects.BQuery the sys.server_permissions table on Server1.CExecute the sp_helplogins system stored procedure for each of the default users that the MedDATA application creates.DQuery the sys.database_permissions and sys.database_principals tables in the MedDB database.

单选题SQL Server数据库提供的错误信息如何查看?()A查看系统视图sys.database_filesB查看系统视图sys.messagesC查看系统视图sys.errorD查看系统视图sys.stats

单选题You create a Microsoft ASP.NET AJAX application by using the Microsoft .NET Frameworkversion 3.5.  You attach Microsoft Visual Studio 2008 debugger to the Microsoft Internet Explorer instance to debug the JavaScript code in the AJAX application.  You need to ensure that the application displays the details of the client-side object on the debugger console.  What should you do?()AUse the Sys.Debug.fail method. BUse the Sys.Debug.trace method. CUse the Sys.Debug.assert method. DUse the Sys.Debug.traceDump method.

单选题In your database, the users SYS and SYSTEM have been assigned the profiles, ADMIN_PROF1 and ADMIN_PROF2, respectively. The rest of the database administrators are assigned the profile ADMIN_PROF3. You create a profile, USER_PROF, and assign it to the application user, Adams. After a week you realize that the profile is no longer required and you decide to drop it. What will Adam’s profile be after the USER_PROF profile has been dropped?()Ano profilesBthe default profileCsame as the profile of SYS userDsame as the profile of SYSTEM user

单选题Which correctly describes the tiers of the Oracle Workflow architecture?()AOracle Database tier and Application server tier onlyBOracle Database tier, Application server tier, and End-user client tier onlyCOracle Database tier, Application server tier, and Development client tier onlyDOracle Database tier, Application server tier, Development client tier, and End-user client tier