多选题Which four are correct guidelines for naming database tables? ()AMust begin with either a number or a letter.BMust be 1-30 characters long.CShould not be an Oracle Server reserved word.DMust contain only A-Z, a-z, 0-+, _, *, and #.EMust contain only A-

题目
多选题
Which four are correct guidelines for naming database tables? ()
A

Must begin with either a number or a letter.

B

Must be 1-30 characters long.

C

Should not be an Oracle Server reserved word.

D

Must contain only A-Z, a-z, 0-+, _, *, and #.

E

Must contain only A-Z, a-z, 0-9, _, $, and #.

F

Must begin with a letter.


相似考题
更多“Which four are correct guidelines for naming database tables”相关问题
  • 第1题:

    Which two are correct steps in taking a binary backup of MyISAM tables?()

    • A、Always stop the server prior to the backup
    • B、Stop the server or lock the tables prior to the backup
    • C、Stop the server or lock the databases prior to the backup
    • D、Make a copy of the .frm, .myd, and the .myi files
    • E、Make a copy of the binary log and tablespace files

    正确答案:B,D

  • 第2题:

    Which is the correct command to back up the database, back up the archived redo logs, and then remove the backed-up archived redo logs?()  

    • A、 backup database
    • B、 backup database and archivelogs
    • C、 backup database plus archivelogs
    • D、 backup database plus archivelog delete input
    • E、 backup database and archivelog delete input

    正确答案:D

  • 第3题:

    Which is the correct command to put the database in ARCHIVELOG mode?()  

    • A、 alter database archivelog
    • B、 alter system enable archivelog mode
    • C、 alter database enable archive
    • D、 alter database archivelog enable
    • E、 None of the above

    正确答案:A

  • 第4题:

    单选题
    You are working as a DBA on the decision support system. There is a business requirement to track and store all transactions for at least three years for a few tables in the database. Automatic undo management is enabled in the database.  Which configuration should you use to accomplish this task?()
    A

     Enable Flashback Data Archive for the tables.

    B

     Specify undo retention guarantee for the database.

    C

     Enable supplemental logging for the database.

    D

     Query V$UNDOSTAT to determine the amount of undo that will be generated and create an undo  tablespace for that size.

    E

     Create Flashback Data Archive on the tablespace on which the tables are stored.


    正确答案: C
    解析: 暂无解析

  • 第5题:

    多选题
    Which three statements are correct about temporary tables?()
    A

    Indexes and views can be created on temporary tables.

    B

    Both the data and the structure of temporary tables can be exported.

    C

    Temporary tables are always created in a user’s temporary tablespace.

    D

    The data inserted into a temporary table in a session is available to other sessions.

    E

    Data manipulation language (DML) locks are never acquired on the data of temporary tables.


    正确答案: E,C
    解析: 暂无解析

  • 第6题:

    多选题
    What are four capabilities of the mysql client program?()
    A

    Creating, dropping, and modifying tables and indexes

    B

    Initiating a binary backup of the database by using the START BACKUP command

    C

    Displaying replication status information

    D

    Shutting down the server by using the SHUTDOWN command

    E

    Creating and dropping databases

    F

    Creating and administering users


    正确答案: B,C
    解析: 暂无解析

  • 第7题:

    单选题
    Which naming method uses the tnsnames.ora file to store the connect descriptor used by the client  whileconnecting to the database instance from a remote machine()
    A

    Host naming method

    B

    Local naming method

    C

    External naming method

    D

    Directory naming method


    正确答案: C
    解析: 暂无解析

  • 第8题:

    多选题
    Which  statements are correct about temporary tables()
    A

    Indexes and views can be created on temporary tables.

    B

    Both the data and the structure of temporary tables can be exported.

    C

    Temporary tables are always created in a user’s temporary tablespace.

    D

    The data inserted into a temporary table in a session is available to other sessions.

    E

    Data manipulation language (DML) locks are never acquired on the data of temporary tables


    正确答案: C,A
    解析: 暂无解析

  • 第9题:

    多选题
    Which two are correct steps in taking a binary backup of MyISAM tables?()
    A

    Always stop the server prior to the backup

    B

    Stop the server or lock the tables prior to the backup

    C

    Stop the server or lock the databases prior to the backup

    D

    Make a copy of the .frm, .myd, and the .myi files

    E

    Make a copy of the binary log and tablespace files


    正确答案: B,A
    解析: 暂无解析

  • 第10题:

    单选题
    In which situation would you use static database registration for a listener()
    A

    when multiple databases are to be registered with the listener

    B

    when DBAs need to connect remotely to start up the database instance

    C

    when users need to connect the database instance using the host naming method

    D

    when the database instance that is to be registered with the listener is configured in shared server mode


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    Which naming method uses the tnsnames.ora file to store the connect descriptor used by the client while connecting to the database instance from a remote machine?()
    A

    host naming method

    B

    local naming method

    C

    external naming method

    D

    directory naming method


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    You are identifying dictionary objects in the Oracle database. Which of the following is a view in the data dictionary?()
    A

    V$DATABASE 

    B

    DBA_TABLES 

    C

    SYSAUD$ 

    D

    EMP


    正确答案: C
    解析: 暂无解析

  • 第13题:

    You are working as a DBA on the decision support system. There is a business requirement to track and store all transactions for at least three years for a few tables in the database. Automatic undo management is enabled in the database.  Which configuration should you use to accomplish this task?()

    • A、 Enable Flashback Data Archive for the tables.
    • B、 Specify undo retention guarantee for the database.
    • C、 Enable supplemental logging for the database.
    • D、 Query V$UNDOSTAT to determine the amount of undo that will be generated and create an undo  tablespace for that size.
    • E、 Create Flashback Data Archive on the tablespace on which the tables are stored.

    正确答案:A

  • 第14题:

    The three tasks shown have been completed in order to configure a naming method: Task 1: Installed on server and client: Oracle Net Services, TCP/IP, TCP/IP protocol adaptor Task 2: Started default listener on port 1521 Task 3: Added global database name to the listener.ora file.  Which naming method was configured?()

    • A、host naming method
    • B、local naming method
    • C、directory naming method
    • D、external naming method

    正确答案:A

  • 第15题:

    You need to improve the performance of the tempdb database on SQL1.Which two actions should you perform?()

    • A、Move tempdb onto a faster disk volume.
    • B、Increase the initial size of tempdb to 1.5 GB
    • C、Increase the size of the data files in the Tracking database.
    • D、Decrease the file growth increment for tempdb to 25 MB
    • E、Use more local temporary tables and fewer global temporary tables in the Tracking database.

    正确答案:A,B

  • 第16题:

    单选题
    Which is the correct command to back up the database, back up the archived redo logs, and then remove the backed-up archived redo logs?()
    A

     backup database

    B

     backup database and archivelogs

    C

     backup database plus archivelogs

    D

     backup database plus archivelog delete input

    E

     backup database and archivelog delete input


    正确答案: D
    解析: 暂无解析

  • 第17题:

    单选题
    You design a Business Intelligence (BI) solution by using SQL Server 2008. You plan to create a SQL Server 2008 Reporting Services (SSRS) solution. Developers generate random reports against a data source that contains 200 tables. Power users generate random reports against four of the 200 tables. You need to design a strategy for the SSRS solution to meet the following requirements: ·Uses minimum amount of development effort. ·Provides two sets of tables in SSRS to the developers group and the power users group. Which strategy should you use?()
    A

     Create two Report Builder models.Include the four frequently used tables in the first model and all the tables in the second model.

    B

     Create a Report Builder model by using all the tables.Create a perspective within the model to use only the four frequently used tables.

    C

     Create a Report Builder model by using all the tables. Create two folders.Place the four frequently used tables in the first folder and the remaining tables in the second folder.

    D

     Create two Data Source Views.Include all the tables in one Data Source View and the four frequently used tables in the other Data Source View.Create two Report Builder models so that each model uses one of the Data Source Views.


    正确答案: C
    解析: 暂无解析

  • 第18题:

    多选题
    You need to ensure that the stored procedure that inserts new loan requests can access data in tables that are stored in another database on the same SQL Server instance. Which two actions should you perform?()
    A

    Ensure that the stored procedure and the tables are owned by users that are associated with the same SQL Server login.

    B

    Ensure that the stored procedure and the tables are owned by the same database user.

    C

    Ensure that the stored procedure and the tables use the same database schema.

    D

    Configure the multiuser database option on both databases.

    E

    Configure the cross-database ownership chaining option on both databases.


    正确答案: C,B
    解析: 暂无解析

  • 第19题:

    单选题
    A frame with two,or sometimes four,arms through which are threaded the guidelines and which is used to keep the drill stem and bit in line with the center opening in the temporary guide base is the().
    A

    drill stem guide

    B

    guide frame

    C

    drill string frame

    D

    casing guide


    正确答案: A
    解析: 暂无解析

  • 第20题:

    多选题
    You need to improve the performance of the tempdb database on SQL1.Which two actions should you perform?()
    A

    Move tempdb onto a faster disk volume.

    B

    Increase the initial size of tempdb to 1.5 GB

    C

    Increase the size of the data files in the Tracking database.

    D

    Decrease the file growth increment for tempdb to 25 MB

    E

    Use more local temporary tables and fewer global temporary tables in the Tracking database.


    正确答案: B,D
    解析: 暂无解析

  • 第21题:

    多选题
    Which four are correct guidelines for naming database tables?()
    A

    Must begin with either a number or a letter.

    B

    Must be 1-30 characters long.

    C

    Should not be an Oracle Server reserved word.

    D

    Must contain only A-Z, a-z, 0-+, _, *, and #.

    E

    Must contain only A-Z, a-z, 0-9, _, $, and #.

    F

    Must begin with a letter.


    正确答案: F,D
    解析: 暂无解析

  • 第22题:

    单选题
    Which is the correct command to put the database in ARCHIVELOG mode?()
    A

     alter database archivelog

    B

     alter system enable archivelog mode

    C

     alter database enable archive

    D

     alter database archivelog enable

    E

     None of the above


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    You are connecting to an Oracle database server from a client by using the following connect string:  SQL> CONNECT hr/hr@pdserver.us.oracle.com:1521/proddb  Which naming method is being used in this case?()
    A

    Local Naming

    B

    Easy Connect

    C

    External Naming

    D

    Directory Naming


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    Click the Exhibit button and examine the diagram.  You are running a database that takes advantage of features provided by Connection Manager, heterogeneous services, and external procedures. The diagram depicts the components used for the naming method you just configured. Which naming method are you using?()
    A

    Host naming method.

    B

    Local naming method.

    C

    Directory naming method.

    D

    External naming method.


    正确答案: C
    解析: 暂无解析