多选题Which two statements about creating constraints are true? ()AConstraint names must start with SYS_CBAll constraints must be defines at the column levelCConstraints can be created after the table is createdDConstraints can be created at the same time th

题目
多选题
Which two statements about creating constraints are true? ()
A

Constraint names must start with SYS_C

B

All constraints must be defines at the column level

C

Constraints can be created after the table is created

D

Constraints can be created at the same time the table is created

E

Information about constraints is found in the VIEW_CONSTRAINTS dictionary view


相似考题
参考答案和解析
正确答案: D,A
解析: 暂无解析
更多“Which two statements about creating constraints are true? ()”相关问题
  • 第1题:

    Which two statements are true about traffic shaping?()

    • A、Out-of-profile packets are queued.
    • B、It causes TCP retransmits.
    • C、Marking/remarking is not supported.
    • D、It does not respond to BECN and ForeSight Messages.
    • E、It uses a single/two-bucket mechanism for metering.

    正确答案:A,C

  • 第2题:

    Which two statements are true about pool-based source NAT? ()(Choose two.)

    • A、PAT is not supported.
    • B、PAT is enabled by default.
    • C、It supports the address-persistent configuration option.
    • D、It supports the junos-global configuration option.

    正确答案:B,C

  • 第3题:

    You execute this command to drop the ITEM table, which has the primary key referred in the ORDERtable:  SQL> DROP TABLE scott.item CASCADE CONSTRAINTS PURGE;  Which two statements are true about the effect of the command()

    • A、No flashback is possible to bring back the ITEM table.
    • B、The ORDER table is dropped along with the ITEM table.
    • C、The dependent referential integrity constraints in the ORDER table are disabled.
    • D、The dependent referential integrity constraints in the ORDER table are removed.
    • E、The table definition of the ITEM table and associated indexes are placed in the recycle bin.

    正确答案:A,D

  • 第4题:

    Which two statements are true about record groups?()

    • A、They are stored in the database. 
    • B、They are stored in local Forms memory. 
    • C、The type is specified explicitly at design time. 
    • D、The type is implied by when and how it is created.

    正确答案:B,D

  • 第5题:

    Which two statements about creating constraints are true?()

    • A、Constraint names must start with SYS_C
    • B、All constraints must be defines at the column level.
    • C、Constraints can be created after the table is created.
    • D、Constraints can be created at the same time the table is created.
    • E、Information about constraints is found in the VIEW_CONSTRAINTS dictionary view.

    正确答案:C,D

  • 第6题:

    Which two statements are true about encrypting RMAN backup?() (Choose two.)

    • A、The transparent encryption of backups uses the encryption wallet
    • B、The database uses the same encryption key for every encrypted backup
    • C、The password encryption of backups only uses the password while creating and restoring backup
    • D、If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.

    正确答案:A,C

  • 第7题:

    多选题
    Which two statements are true about L2TP tunnels?() (Choose two.)
    A

    Traffic is clear text

    B

    Traffic is encrypted 

    C

    They are initiated by the LNS

    D

    They are initiated by the LAC


    正确答案: B,D
    解析: 暂无解析

  • 第8题:

    多选题
    By default, which two statements are true about export routing polices?()
    A

    Export polices can evaluate only active routes

    B

    Export polices can evaluate all routes

    C

    Export polices can be applied to the forwarding table

    D

    Export polices can be applied to interfaces


    正确答案: B,A
    解析: 暂无解析

  • 第9题:

    多选题
    Which two statements are true about AH?() (Choose two.)
    A

    AH provides data integrity.

    B

    AH is identified by IP protocol 50.

    C

    AH is identified by IP protocol 51.

    D

    AH cannot work in conjunction with ESP


    正确答案: D,C
    解析: 暂无解析

  • 第10题:

    多选题
    Which two statements about SCSI are true? ()
    A

    The bus is limited to 32 devices

    B

    It is a full duplex serial standard

    C

    It is a half-duplex serial standard

    D

    It allows up to 320 MB/s of shared channel bandwidth


    正确答案: B,C
    解析: 暂无解析

  • 第11题:

    多选题
    You execute this command to drop the ITEM table, which has the primary key referred in the ORDERtable:  SQL> DROP TABLE scott.item CASCADE CONSTRAINTS PURGE;  Which two statements are true about the effect of the command()
    A

    No flashback is possible to bring back the ITEM table.

    B

    The ORDER table is dropped along with the ITEM table.

    C

    The dependent referential integrity constraints in the ORDER table are disabled.

    D

    The dependent referential integrity constraints in the ORDER table are removed.

    E

    The table definition of the ITEM table and associated indexes are placed in the recycle bin.


    正确答案: E,A
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements about creating constraints are true?()
    A

    Constraint names must start with SYS_C

    B

    All constraints must be defines at the column level.

    C

    Constraints can be created after the table is created.

    D

    Constraints can be created at the same time the table is created.

    E

    Information about constraints is found in the VIEW_CONSTRAINTS dictionary view.


    正确答案: B,D
    解析: 暂无解析

  • 第13题:

    Which two statements about the Cisco Nexus 1000V VSM are true?()

    • A、It performs switching decisions and forwarding for the VEM
    • B、It can be run on a virtual machine
    • C、It can be used for remote VEM switching Iine cards

    正确答案:B,C

  • 第14题:

    Which two statements are true about precedence values in policy?() (Choose two.)

    • A、1 is the default precedence.
    • B、A lower number is preferred.
    • C、A higher number is preferred.
    • D、100 is the default precedence.

    正确答案:B,D

  • 第15题:

    Which two statements are true about encrypting RMAN backup?()

    • A、 The transparent encryption of backups uses the encryption wallet
    • B、 The database uses the same encryption key for every encrypted backup
    • C、 The password encryption of backups only uses the password while creating and restoring backup
    • D、 If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD  command to make password-protected backups

    正确答案:A,C

  • 第16题:

    Which two statements are true about constraints? ()

    • A、The UNIQUE constraint does not permit a null value for the column.
    • B、A UNIQUE index gets created for columns with PRIMARY KEY and UNIQUE constraints.
    • C、The PRIMARY KEY and FOREIGN KEY constraints create a UNIQUE index.
    • D、The NOT NULL constraint ensures that null values are not permitted for the column.

    正确答案:A,D

  • 第17题:

    Which two statements about creating constraints are true?()

    • A、Constraint names must start with SYS_C
    • B、All constraints must be defines at the column level
    • C、Constraints can be created after the table is created
    • D、Constraints can be created at the same time the table is created
    • E、Information about constraints is found in the VIEW_CONSTRAINTS dictionary view

    正确答案:C,D

  • 第18题:

    多选题
    Which two are true about has-a and is-a relationships?()
    A

    Inheritance represents an is-a relationship.

    B

    Inheritance represents a has-a relationship.

    C

    Interfaces must be used when creating a has-a relationship.

    D

    Instance variables can be used when creating a has-a relationship.


    正确答案: B,A
    解析: 暂无解析

  • 第19题:

    多选题
    Which two statements are true about encrypting RMAN backup?()
    A

    The transparent encryption of backups uses the encryption wallet

    B

    The database uses the same encryption key for every encrypted backup

    C

    The password encryption of backups only uses the password while creating and restoring backup

    D

    If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.


    正确答案: B,C
    解析: 暂无解析

  • 第20题:

    多选题
    Which two statements are true about encrypting RMAN backup?()
    A

    The transparent encryption of backups uses the encryption wallet

    B

    The database uses the same encryption key for every encrypted backup

    C

    The password encryption of backups only uses the password while creating and restoring backup

    D

    If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD  command to make password-protected backups


    正确答案: D,C
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements about creating constraints are true?()
    A

    Constraint names must start with SYS_C

    B

    All constraints must be defines at the column level

    C

    Constraints can be created after the table is created

    D

    Constraints can be created at the same time the table is created

    E

    Information about constraints is found in the VIEW_CONSTRAINTS dictionary view


    正确答案: E,D
    解析: 暂无解析

  • 第22题:

    多选题
    Which two statements are true about constraints? ()
    A

    The UNIQUE constraint does not permit a null value for the column.

    B

    A UNIQUE index gets created for columns with PRIMARY KEY and UNIQUE constraints.

    C

    The PRIMARY KEY and FOREIGN KEY constraints create a UNIQUE index.

    D

    The NOT NULL constraint ensures that null values are not permitted for the column.


    正确答案: A,B
    解析: 暂无解析

  • 第23题:

    多选题
    Which two statements are true about encrypting RMAN backup?() (Choose two.)
    A

    The transparent encryption of backups uses the encryption wallet

    B

    The database uses the same encryption key for every encrypted backup

    C

    The password encryption of backups only uses the password while creating and restoring backup

    D

    If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.


    正确答案: C,D
    解析: 暂无解析

  • 第24题:

    多选题
    Which two statements are true about traffic shaping?()
    A

    Out-of-profile packets are queued.

    B

    It causes TCP retransmits.

    C

    Marking/remarking is not supported.

    D

    It does not respond to BECN and ForeSight Messages.

    E

    It uses a single/two-bucket mechanism for metering.


    正确答案: E,B
    解析: 暂无解析