1 and 2
2 and 5
1,3,and 4
3,4,and 5
1,2,3,and 4
第1题:
Which statement correctly describes SQL and /SQL*Plus?()
第2题:
You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis. How would you achieve this?()
第3题:
Observe the information in the columns: 1: The SGA a. Text and parsed forms of all SQL statements 2: The cursor state b. Run-time memory values for the SQL statement, such as rows retrieved 3: User-session data c. Security and resource usage information 4:The stack space d. Local variables for the process Which option has the correct match between the memory areas and their contents()
第4题:
Which two client requests are captured during database replay Capture?()
第5题:
Which two client requests are captured during database replay Capture?() (Choose two)
第6题:
These are points that describe the contents of different memory components: 1: Descriptive information or metadata about schema objects that are queried by using SQL statements 2: The run-time area for data manipulation language (DML) or data definition language (DDL) statements 3: Results of SQL queries and PL/SQL functions 4: Executable forms of SQL cursors, PL/SQL programs, and Java classes 5: The information necessary to reconstruct changes made to the database by a transaction Which of these will be stored in theShared Poolif the necessary configurations are done()
第7题:
Flashback queries
Shared server requests
Login and logoff activities of sessions
Direct path load of data from external files by using utilities such as SQL *loader
Data definition language (DDL) and data manipulation language (DML) operations
第8题:
Repair damaged data dictionary entries.
Delete data dictionary information about database objects you no longer need.
Extract data definition commands from the data dictionary in a variety of formats.
Prepare pseudocode modules for conversion to Java or PL/SQL programs with a Metadata code generator
第9题:
1-c,2-b,3-d,4-a
1-c,2-b,3-c,4-a
1-a,2-b,3-c,4-d
1-a,2-b,3-d,4-c
第10题:
by using triggers
by using external tables
by using anonymous PL/SQL blocks
by auditing all DML operations on the table
第11题:
Both SQL and /SQL*plus allow manipulation of values in the database.
/SQL* Plus recognizes SQL satement and sends them to the server; SQL is the Oracle proprietary interface for executing SQL statements.
/SQL* Plus language for communicating with the Oracle server to access data; SQL recognizes SQL statements and sends them to the server.
/SQL manipulates data and table definition in the database; /SQL* Plus does not allow manipulation of values in the database.
第12题:
1 and 2
2 and 5
1,3,and 4
3,4,and 5
1,2,3,and 4
第13题:
ENCRYPT_TS is an encrypted tablespace that contains tables with data. Which statement is true regarding the effect of queries and data manipulation language (DML) statements on the encrypted data in the tables?()
第14题:
Which statements are correct about temporary tables()
第15题:
What does the Metadata Application Programming Interface (API) allow you to do?()
第16题:
Which two statements are true about simple views?()
第17题:
Which three statements are correct about temporary tables?()
第18题:
You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis. How would you achieve this()
第19题:
The data is decrypted during SORT and JOIN operations.
The data remains encrypted when it is read into memory.
The data remains encrypted when it is stored in the redo logs.
The data remains encrypted in the UNDO tablespace provided that the UNDO tablespace was created with the encryption option enabled.
第20题:
Indexes and views can be created on temporary tables.
Both the data and the structure of temporary tables can be exported.
Temporary tables are always created in a user’s temporary tablespace.
The data inserted into a temporary table in a session is available to other sessions.
Data manipulation language (DML) locks are never acquired on the data of temporary tables
第21题:
Indexes and views can be created on temporary tables.
Both the data and the structure of temporary tables can be exported.
Temporary tables are always created in a user’s temporary tablespace.
The data inserted into a temporary table in a session is available to other sessions.
Data manipulation language (DML) locks are never acquired on the data of temporary tables.
第22题:
Implement a stored procedure that writes data about schema changes to a log table.
Implement DDL AFTER triggers that write user and schema information to a log table.
Implement a DML INSTEAD OF trigger that writes data about schema changes to a log table.
Implement a DML AFTER trigger that writes data about schema changes to a log table.
第23题:
by using triggers
by using Data Pump
by using external tables
by using anonymous PL/SQL blocks
第24题:
Flashback queries
Shared server requests
Login and logoff activities of sessions
Direct path load of data from external files by using utilities such as SQL *loader
Data definition language (DDL) and data manipulation language (DML) operations