单选题Which of the following best describes the lock protection provided by DB2 for the current row of a cursor?()AThe cursor is only protected from updates and deletes by concurrent applications.BThe row is only protected from positioned updates and deletes that reference another cursor of the same application.CThe cursor is protected from positioned updates and deletes that reference another cursor of a different application.DThe row is protected from updates and deletes by the current application and from positioned updates and deletes that reference another cursor of the same application.

单选题
Which of the following best describes the lock protection provided by DB2 for the current row of a cursor?()
A

The cursor is only protected from updates and deletes by concurrent applications.

B

The row is only protected from positioned updates and deletes that reference another cursor of the same application.

C

The cursor is protected from positioned updates and deletes that reference another cursor of a different application.

D

The row is protected from updates and deletes by the current application and from positioned updates and deletes that reference another cursor of the same application.


参考解析

解析: 暂无解析

相关考题:

Consider the following:Which statement best describes the meaning of the value for the key_len column?() A.It shows the total size of the index rowB.It shows how many columns in the index are examinedC.It shows the number of characters indexed in the keyD.It shows how many bytes will be used from each index row

The opening of cursor CSR01 produces the following result set:STUDENT LASTNM FIRSTNM CLASSNO 123 Brown John T100 213 Bailey JamesT100 312 Carter Arlene T210 465 Chas Devon T305 546 Davis Steven T405If this Fetch statement is executed: FETCH csr01 INTO :studnum, :firstname, :lastname, :class Which of the following DELETE statements will cause this row to be deleted?()A.DELETE ALL FROM tab01 FOR CURRENT OF csr01B.DELETE FROM tab01 FOR CURRENT csr01 WITH RSC.DELETE * FROM tab01 WHERE CURRENT csr01 WITH CSD.DELETE FROM tab01 WHERE CURRENT OF csr01 WITH RR

oracle数据库中下列哪个等待事件显示行级锁竞争?()A、latch:shared poolB、cursor:pin S waiton XC、enq:TX-row lock contentionD、dbfile scattered read

Which of these best describes the actions taken when a VTP message is received on a switch configuredwith the VTP mode "transparent"?()A、VTP updates are ignored and forwarded out all ports.B、VTP updates are ignored and forwarded out trunks only.C、VTP updates are made to the VLAN database and are forwarded out trunks only.D、VTP updates are ignored and are not forwarded.

Which of the following will help protect an operating system from vulnerability?()A、Download free anti-virus programs from the Internet.B、Perform updates from the manufacturers website regularly.C、Using the operating systems email program only to open attachments.D、Monitoring what is displayed on the screen.

The opening of cursor CSR01 produces the following result set: STUDENT LASTNM FIRSTNM CLASSNO 123 Brown John T100 213 Bailey James T100 312 Carter Arlene T210 465 Chas Devon T305 546 Davis Steven T405 If this Fetch statement is executed: FETCH csr01 INTO :studnum, :firstname, :lastname, :class Which of the following DELETE statements will cause this row to be deleted?()A、DELETE ALL FROM tab01 FOR CURRENT OF csr01B、DELETE FROM tab01 FOR CURRENT csr01 WITH RSC、DELETE * FROM tab01 WHERE CURRENT csr01 WITH CSD、DELETE FROM tab01 WHERE CURRENT OF csr01 WITH RR

Which of the following is TRUE for the DB2 isolation level Cursor Stability (CS)?()A、An application process acquires at least a share lock on the current row of every cursor.B、Any row that is read during a unit of work cannot be changed by other application processes until the unit of work is complete.C、Any row changed by another application process can be read, even if the change has not been committed by that application process.D、An application process that issues the same query more than once in a unit of work will not see additional rows caused by other application processes appending new information to the database.

Which of the following best describes the lock protection provided by DB2 for the current row of a cursor?()A、The cursor is only protected from updates and deletes by concurrent applications.B、The row is only protected from positioned updates and deletes that reference another cursor of the same application.C、The cursor is protected from positioned updates and deletes that reference another cursor of a different application.D、The row is protected from updates and deletes by the current application and from positioned updates and deletes that reference another cursor of the same application.

A customer wants to have employees work from remote locations as well as in the office.  All communications must be secure and files must be protected from access by unauthorized people.  The employee’s applications (database inserts and reads) are only accessed with a web browser.  Which of the following capabilities is necessary?()A、SSLB、PGPC、File encryption programD、Public key encryption

Which of the following best describes how locks are used in DB2?()A、To maintain control of updated rows for commit processingB、To ensure only committed changes are altered by another applicationC、To allow two applications to update the same row of data simultaneouslyD、To prevent multiple applications from accessing the same data simultaneously

Which two statements are correct regarding the Flashback Versions Query feature?()A、 You can use this feature to identify the committed versions of the rows, but not the uncommitted versions.B、 You can use this feature to identify the versions of V$ views.C、 You can use this feature to identify the inserts, deletes, and updates performed on a particular row but not the data definition language (DDL) operations performed on the table.D、 You can use this feature for a table only if row movement is enabled for the table.E、 You can use this feature to identify the versions of external and fixed tables.

Which two statements about subqueries are true?()A、A single row subquery can retrieve data from only one table.B、A SQL query statement cannot display data from table B that is referred to in its subquery, unless table B is included in the main query's FROM clause.C、A SQL query statement can display data from table B that is referred to in its subquery, without including table B in its own FROM clause.D、A single row subquery can retrieve data from more than one table.E、A single row subquery cannot be used in a condition where the LIKE operator is used for comparison.F、A multiple-row subquery cannot be used in a condition where the LIKE operator is used for comparison.

Consider this syntax:   MERGE INTO t1  USING t2 ON (join predicate)…..   What does the MERGE syntax do?()A、It performs a merge join of the row from T2 only if it doesn’t exist in the T1 table. B、It creates a natural join of tables T1 and T2 for all columns that have the same name. C、It creates a Cartesian product of table T1 and table T2 for all columns that have the same name. D、For each row from T2, it updates the row if it exists within table T1, otherwise it inserts the row into T1.

Which two statements are true regarding single row functions?()A、They accept only a single argument B、They can be nested only to two levels C、Arguments can only be column values or constants D、They always return a single result row for every row of a queried table E、They can return a data type value different from the one that is referenced

单选题查询“读者”表的所有记录并存储于临时表文件one中的SQL语句是(  )。ASELECT*FROM读者INTO CURSOR oneBSELECT*FROM读者TO CURSOR oneCSELECT*FROM读者INTO CURSOR DBF oneDSELECT*FROM读者TO CURSOR DBF one

单选题Which of the following best describes how locks are used in DB2?()ATo maintain control of updated rows for commit processingBTo ensure only committed changes are altered by another applicationCTo allow two applications to update the same row of data simultaneouslyDTo prevent multiple applications from accessing the same data simultaneously

单选题Which of these best describes the actions taken when a VTP message is received on a switch configuredwith the VTP mode "transparent"?()AVTP updates are ignored and forwarded out all ports.BVTP updates are ignored and forwarded out trunks only.CVTP updates are made to the VLAN database and are forwarded out trunks only.DVTP updates are ignored and are not forwarded.

单选题Which of the following will help protect an operating system from vulnerability?()ADownload free anti-virus programs from the Internet.BPerform updates from the manufacturers website regularly.CUsing the operating systems email program only to open attachments.DMonitoring what is displayed on the screen.

单选题The opening of cursor CSR01 produces the following result set: STUDENT LASTNM FIRSTNM CLASSNO 123 Brown John T100 213 Bailey James T100 312 Carter Arlene T210 465 Chas Devon T305 546 Davis Steven T405 If this Fetch statement is executed: FETCH csr01 INTO :studnum, :firstname, :lastname, :class Which of the following DELETE statements will cause this row to be deleted?()ADELETE ALL FROM tab01 FOR CURRENT OF csr01BDELETE FROM tab01 FOR CURRENT csr01 WITH RSCDELETE * FROM tab01 WHERE CURRENT csr01 WITH CSDDELETE FROM tab01 WHERE CURRENT OF csr01 WITH RR

单选题Which of these best describes the actions taken when a VTP message is received on a switch configured with the VTP mode "transparent"? ()A VTP updates are ignored and forwarded out all ports.B VTP updates are ignored and forwarded out trunks only.C VTP updates are made to the VLAN database and are forwarded out trunks only.D VTP updates are ignored and are not forwarded.

单选题Consider this syntax:   MERGE INTO t1  USING t2 ON (join predicate)…..   What does the MERGE syntax do?()AIt performs a merge join of the row from T2 only if it doesn’t exist in the T1 table. BIt creates a natural join of tables T1 and T2 for all columns that have the same name. CIt creates a Cartesian product of table T1 and table T2 for all columns that have the same name. DFor each row from T2, it updates the row if it exists within table T1, otherwise it inserts the row into T1.

多选题Which two statements about subqueries are true? ()AA single row subquery can retrieve data from only one table.BA SQL query statement cannot display data from table B that is referred to in its subquery, unless table B is included in the main query's FROM clause.CA SQL query statement can display data from table B that is referred to in its subquery, without including B in its own FROM clause.DA single row subquery can retrieve data from more than one table.EA single row subquery cannot be used in a condition where the LIKE operator is used for comparison.FA multiple-row subquery cannot be used in an INSERT statement to insert multiple rows at a time.

单选题The opening of cursor CSR01 produces the following result set: STUDENT LASTNM FIRSTNM CLASSNO 123 Brown John T100 213 Bailey James T100 312 Carter Arlene T210 465 Chas Devon T305 546 Davis Steven T405 If this Fetch statement is executed: FETCH csr01 INTO :studnum, :firstname, :lastname, :class Which of the following DELETE statements will cause this row to be deleted?()ADELETE ALL FROM tab01 FOR CURRENT OF csr01BDELETE FROM tab01 FOR CURRENT csr01 WITH RSCDELETE * FROM tab01 WHERE CURRENT csr01 WITH CSDDELETE FROM tab01 WHERE CURRENT OF csr01 WITH RR

单选题A customer wants to have employees work from remote locations as well as in the office.  All communications must be secure and files must be protected from access by unauthorized people.  The employee’s applications (database inserts and reads) are only accessed with a web browser.  Which of the following capabilities is necessary?()ASSLBPGPCFile encryption programDPublic key encryption

单选题Which of the following devices are protected from being motorized by a reverse-power relay?()AAlternatorsBWave guidesCExcitersDAmplidynes

单选题Which of the following is TRUE for the DB2 isolation level Cursor Stability (CS)?()AAn application process acquires at least a share lock on the current row of every cursor.BAny row that is read during a unit of work cannot be changed by other application processes until the unit of work is complete.CAny row changed by another application process can be read, even if the change has not been committed by that application process.DAn application process that issues the same query more than once in a unit of work will not see additional rows caused by other application processes appending new information to the database.

单选题Consider the following: Which statement best describes the meaning of the value for the key_len column?()A It shows the total size of the index rowB It shows how many columns in the index are examinedC It shows the number of characters indexed in the keyD It shows how many bytes will be used from each index row