单选题john has created a database library, librarians are responsible for adding new information to the db library. which one of the following minimum level of access he can grant the librarians of the db library?()A readerB authorC managerD designer

单选题
john has created a database library, librarians are responsible for adding new information to the db library. which one of the following minimum level of access he can grant the librarians of the db library?()
A

 reader

B

 author

C

 manager

D

 designer


参考解析

解析: 暂无解析

相关考题:

johnhascreatedadatabaselibrary,librariansareresponsibleforaddingnewinformationtothedblibrary.whichoneofthefollowingminimumlevelofaccesshecangrantthelibrariansofthedblibrary?() A.readerB.authorC.managerD.designer

An application that needs to use a shared library has a deployment descriptor that only specifies the Specification-Version and Extension-Name of the shared library. When the application is deployed, which shared library will be used?()A、The application will go into an ADMIN state and fail to deploy because the Implementation- Version is required.B、The application will be deployed but the classes in the shared library will not be available.C、If you are using the WebLogic Admin Console, you will be prompted for the version you want to  use; otherwise, the application will fail to deploy.D、If there are multiple versions of the shared library deployed, WebLogic will use the one with the highest Implementation-Version.E、If there are multiple versions of the shared library deployed, WebLogic will use the one that was  deployed most recently.

You have a server that runs Windows Server 2008. The server has the Windows SharePoint Services (WSS) server role installed. The server is configured to accept incoming e-mail. You create a new document library.  You need to ensure that any user can send e-mail to the document library. What should you do?()A、Modify the RSS setting for the document library.B、Modify the permissions for the document library.C、Modify the incoming e-mail settings for the document library.D、Enable anonymous authentication for the Web application.

You work as an application developer at Certkiller .com. Certkiller .com has been hired by a small local private school to develop a class library that will be used in an application named ManageAttendance for the purpose of managing student records.You are responsible for developing this class library. Certkiller .com has instructed you to create a collection in the application to store learners’ results. The school has informed you that they currently only have seven learners, but that this value will triple in the following year. Due to the limited resources, you need to ensure that the collection you create consumes a minimum amount of resources. What should you use to create the collection?()A、 The HybridDictionary collection class.B、 The HashTable collection class.C、 The ListDictionary collection class.D、 The StringCollection collection class.

A new company has been given one public IP address. The company employs 200 users requiring Internet access from the headquarters. Which of the following can be implemented to provide Internet access for all the employees?()A、MulticastingB、Proxy serverC、NATD、Subnetting

An administrator is up grading the back up server from a single tape drive to a SCSI tape library. The library has been unpackaged, mounted, and the library drivers installed.  Which of the following items should the administrator have to connect the device to the backup server?()A、 SCSI cableB、 SCSI interface adapter on the tape libraryC、 SCSI termination card on the serverD、 iSCSI cable

Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A、The database user must be created using DB2 Control Center.B、The database user must be created using the DB2 Command Line Processor.C、The database user may be created using DB2 Control Center or DB2 Command Line Processor.D、The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.

john has created a database library, librarians are responsible for adding new information to the db library. which one of the following minimum level of access he can grant the librarians of the db library?()A、 readerB、 authorC、 managerD、 designer

Which one of the following provides the capability to partition the 3584 Tape Library into separatelogical libraries?()A、Control Path Failover B、Enhanced Frame Control C、Advanced Library Management System D、High Availability Library Control

You are adding redo logs to the Oracle database. Creating a new redo log adds information to which of the following Oracle resources? ()A、Shared pool B、Control file C、SGA D、PGA

You are analyzing how Oracle processes user statements. SQL and PL/SQL parse information is stored in which of the following database memory areas? ()A、Library cache B、Row cacheC、Dictionary cache D、Large area E、Buffer cache

You are part of the DBA team working for a multinational bank. The team is responsible for performing administrative tasks on the database server located at the home office. The database server at the home office has a production database and a test database named TESTDB. The test database is primarily used for testing database commands and configuration settings befor implementing these settings on the production database. The test database is also used for the development of database applications. You have been asked by the senior DBA to grant the SYSDBA privilege to a new team member, John, so that he can perform some administrative tasks, such as shutdown and startup operations, on TESTDB. You use the password file to configure remote authentication on the TESTDB database. You execute the following statement to grant the SYSDBA privilege to John:   SQLGRANT SYSDBA TO john;   However, you receive the following error:   ORA-01996: GRANT failed: password file   ’c:/oracle/ora9i/dbs/testdb.pwd’ is full   Which action should you take to add the user john to the password file without removing any of the existing users?()A、 Create another password file and then re-execute the GRANT statement.B、 Re-create the password file, specifying a larger number of allowed entries, and then re-execute the GRANT statement.C、 Change the value of the REMOTE_LOGIN_PASSWORDFILE initialization parameter in theinitialization parameter file to NONE and then re-execute the GRANT statement.D、 Change the value of the REMOTE_LOGIN_PASSWORDFILE initialization parameter in the initialization parameter file to SHARED and then re-execute the GRANT statement.

Records from the data dictionary information are stored in which of the following database memory areas?()A、Library cache B、Row cache C、Session UGA D、Buffer cache

A full backup of your database named DB1 is created automatically at midnight every day. Differential backups of DB1 occur twice each day at 10:00 and at 16:00. A database snapshot is created every day at noon. A developer reports that he accidentally dropped the Pricelist table in DB1 at 12:30. The last update to Pricelist occurred one week ago. You need to recover the Pricelist table. You want to achieve this goal by using the minimum amount of administrative effort. You must also minimize the amount of data that is lost. What should you do?()A、 Restore the most recent backup into a new database named DB1bak. Apply the most recent differential backup. Copy the Pricelist table from DB1bak to DB1. B、 Delete all database snapshots except the most recent one. Restore DB1 from the most recent database snapshot. C、 Recover DB1 from the most recent backup. Apply the most recent differential backup. D、 Copy the Pricelist table from the most recent database snapshot into DB1.

单选题A new company has been given one public IP address. The company employs 200 users requiring Internet access from the headquarters. Which of the following can be implemented to provide Internet access for all the employees?()AMulticastingBProxy serverCNATDSubnetting

单选题You are part of the DBA team working for a multinational bank. The team is responsible for performing administrative tasks on the database server located at the home office. The database server at the home office has a production database and a test database named TESTDB. The test database is primarily used for testing database commands and configuration settings befor implementing these settings on the production database. The test database is also used for the development of database applications. You have been asked by the senior DBA to grant the SYSDBA privilege to a new team member, John, so that he can perform some administrative tasks, such as shutdown and startup operations, on TESTDB. You use the password file to configure remote authentication on the TESTDB database. You execute the following statement to grant the SYSDBA privilege to John:   SQLGRANT SYSDBA TO john;   However, you receive the following error:   ORA-01996: GRANT failed: password file   ’c:/oracle/ora9i/dbs/testdb.pwd’ is full   Which action should you take to add the user john to the password file without removing any of the existing users?()A Create another password file and then re-execute the GRANT statement.B Re-create the password file, specifying a larger number of allowed entries, and then re-execute the GRANT statement.C Change the value of the REMOTE_LOGIN_PASSWORDFILE initialization parameter in theinitialization parameter file to NONE and then re-execute the GRANT statement.D Change the value of the REMOTE_LOGIN_PASSWORDFILE initialization parameter in the initialization parameter file to SHARED and then re-execute the GRANT statement.

单选题You work as an application developer at Certkiller .com. Certkiller .com has been hired by a small local private school to develop a class library that will be used in an application named ManageAttendance for the purpose of managing student records.You are responsible for developing this class library. Certkiller .com has instructed you to create a collection in the application to store learners’ results. The school has informed you that they currently only have seven learners, but that this value will triple in the following year. Due to the limited resources, you need to ensure that the collection you create consumes a minimum amount of resources. What should you use to create the collection?()A The HybridDictionary collection class.B The HashTable collection class.C The ListDictionary collection class.D The StringCollection collection class.

单选题Which one of the following provides the capability to partition the 3584 Tape Library into separatelogical libraries?()AControl Path Failover BEnhanced Frame Control CAdvanced Library Management System DHigh Availability Library Control

单选题john has created a database library, librarians are responsible for adding new information to the db library. which one of the following minimum level of access he can grant the librarians of the db library?()A readerB authorC managerD designer

单选题An application that needs to use a shared library has a deployment descriptor that only specifies the Specification-Version and Extension-Name of the shared library. When the application is deployed, which shared library will be used?()AThe application will go into an ADMIN state and fail to deploy because the Implementation- Version is required.BThe application will be deployed but the classes in the shared library will not be available.CIf you are using the WebLogic Admin Console, you will be prompted for the version you want to  use; otherwise, the application will fail to deploy.DIf there are multiple versions of the shared library deployed, WebLogic will use the one with the highest Implementation-Version.EIf there are multiple versions of the shared library deployed, WebLogic will use the one that was  deployed most recently.

单选题A full backup of your database named DB1 is created automatically at midnight every day. Differential backups of DB1 occur twice each day at 10:00 and at 16:00. A database snapshot is created every day at noon. A developer reports that he accidentally dropped the Pricelist table in DB1 at 12:30. The last update to Pricelist occurred one week ago. You need to recover the Pricelist table. You want to achieve this goal by using the minimum amount of administrative effort. You must also minimize the amount of data that is lost. What should you do?()A Restore the most recent backup into a new database named DB1bak. Apply the most recent differential backup. Copy the Pricelist table from DB1bak to DB1. B Delete all database snapshots except the most recent one. Restore DB1 from the most recent database snapshot. C Recover DB1 from the most recent backup. Apply the most recent differential backup. D Copy the Pricelist table from the most recent database snapshot into DB1.

单选题You are adding redo logs to the Oracle database. Creating a new redo log adds information to which of the following Oracle resources? ()AShared pool BControl file CSGA DPGA

单选题An administrator is up grading the back up server from a single tape drive to a SCSI tape library. The library has been unpackaged, mounted, and the library drivers installed.  Which of the following items should the administrator have to connect the device to the backup server?()A SCSI cableB SCSI interface adapter on the tape libraryC SCSI termination card on the serverD iSCSI cable

单选题You are managing an Oracle Database 10g database that uses Oracle Managed Files (OMF). You enabled the block change tracking feature for the database. Which statement regarding the change tracking file is true?()A One block change tracking file is created for each data file. By default, the file is created in DB_CREATE_FILE_DEST.B One block change tracking file is created for each data file. By default, the file is created in BACKGROUND_DUMP_DEST.C One block change tracking file is created for the database. By default, the file is created in DB_CREATE_FILE_DEST.D One block change tracking file is created for the database. By default, the file is created in BACKGROUND_DUMP_DEST.

单选题You have a server that runs Windows Server 2008. The server has the Windows SharePoint Services (WSS) server role installed. The server is configured to accept incoming e-mail. You create a new document library.  You need to ensure that any user can send e-mail to the document library. What should you do?()AModify the RSS setting for the document library.BModify the permissions for the document library.CModify the incoming e-mail settings for the document library.DEnable anonymous authentication for the Web application.

单选题You are a systems administrator responsible for securing a Windows Server 2008 Web server. You havecreated a new Web site called Contoso Intranet that will contain seven Web applications. One of theapplication developers has told you that her Web application requires a new request handler that isprocessed using a .NET library her team created. How can you meet these requirements while also maximizing security for the server?()AAdd a new managed handler to the Contoso Intranet Web site.BAdd a new managed handler for the specific Web application that requires it.CAdd a new module mapping to the Contoso Intranet Web site.DAdd a new module mapping for the specific Web application that requires it.

单选题Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()AThe database user must be created using DB2 Control Center.BThe database user must be created using the DB2 Command Line Processor.CThe database user may be created using DB2 Control Center or DB2 Command Line Processor.DThe database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.

单选题AThey can buy new books.BThey can change to a computer system.CThey can change the librarians there.DThey can reprint all the cards.