单选题These are points that describe the contents of different memory components:  1: Descriptive information or metadata about schema objects that are queried by using SQL statements  2: The run-time area for data manipulation language (DML) or data definit

题目
单选题
These are points that describe the contents of different memory components:  1: Descriptive information or metadata about schema objects that are queried by using SQL statements  2: The run-time area for data manipulation language (DML) or data definition language (DDL) statements  3: Results of SQL queries and PL/SQL functions  4: Executable forms of SQL cursors, PL/SQL programs, and Java classes  5: The information necessary to reconstruct changes made to the database by a transaction  Which of these will be stored in theShared Poolif the necessary configurations are done()
A

1 and 2

B

2 and 5

C

1,3,and 4

D

3,4,and 5

E

1,2,3,and 4


相似考题
更多“单选题These are points that describe the contents of different memory components:  1: Descriptive information or metadata about schema objects that are queried by using SQL statements  2: The run-time area for data manipulation language (DML) or data definit”相关问题
  • 第1题:

    Which statement correctly describes SQL and /SQL*Plus?()

    • A、Both SQL and /SQL*plus allow manipulation of values in the database.
    • B、/SQL* Plus recognizes SQL satement and sends them to the server; SQL is the Oracle proprietary interface for executing SQL statements.
    • C、/SQL* Plus language for communicating with the Oracle server to access data; SQL recognizes SQL statements and sends them to the server.
    • D、/SQL manipulates data and table definition in the database; /SQL* Plus does not allow manipulation of values in the database.

    正确答案:A

  • 第2题:

    You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()

    • A、by using triggers
    • B、by using external tables
    • C、by using anonymous PL/SQL blocks
    • D、by auditing all DML operations on the table

    正确答案:A

  • 第3题:

    Observe the information in the columns:  1: The SGA     a. Text and parsed forms of all SQL statements  2: The cursor state   b. Run-time memory values for the SQL statement, such as rows retrieved  3: User-session data   c. Security and resource usage information  4:The stack space   d. Local variables for the process  Which option has the correct match between the memory areas and their contents()

    • A、1-c,2-b,3-d,4-a
    • B、1-c,2-b,3-c,4-a
    • C、1-a,2-b,3-c,4-d
    • D、1-a,2-b,3-d,4-c

    正确答案:C

  • 第4题:

    Which two client requests are captured during database replay Capture?()

    • A、 Flashback queries
    • B、 Shared server requests
    • C、 Login and logoff activities of sessions
    • D、 Direct path load of data from external files by using utilities such as SQL *loader
    • E、 Data definition language (DDL) and data manipulation language (DML) operations

    正确答案:C,E

  • 第5题:

    Which two client requests are captured during database replay Capture?() (Choose two)

    • A、Flashback queries
    • B、Shared server requests
    • C、Login and logoff activities of sessions
    • D、Direct path load of data from external files by using utilities such as SQL *loader
    • E、Data definition language (DDL) and data manipulation language (DML) operations

    正确答案:C,E

  • 第6题:

    These are points that describe the contents of different memory components:  1: Descriptive information or metadata about schema objects that are queried by using SQL statements  2: The run-time area for data manipulation language (DML) or data definition language (DDL) statements  3: Results of SQL queries and PL/SQL functions  4: Executable forms of SQL cursors, PL/SQL programs, and Java classes  5: The information necessary to reconstruct changes made to the database by a transaction  Which of these will be stored in theShared Poolif the necessary configurations are done()

    • A、1 and 2
    • B、2 and 5
    • C、1,3,and 4
    • D、3,4,and 5
    • E、1,2,3,and 4

    正确答案:C

  • 第7题:

    多选题
    Which two client requests are captured during database replay Capture?()
    A

    Flashback queries

    B

    Shared server requests

    C

    Login and logoff activities of sessions

    D

    Direct path load of data from external files by using utilities such as SQL *loader

    E

    Data definition language (DDL) and data manipulation language (DML) operations


    正确答案: D,A
    解析: 暂无解析

  • 第8题:

    单选题
    What does the Metadata Application Programming Interface (API) allow you to do?()
    A

    Repair damaged data dictionary entries.

    B

    Delete data dictionary information about database objects you no longer need.

    C

    Extract data definition commands from the data dictionary in a variety of formats.

    D

    Prepare pseudocode modules for conversion to Java or PL/SQL programs with a Metadata code generator


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    Observe the information in the columns:  1: The SGA     a. Text and parsed forms of all SQL statements  2: The cursor state   b. Run-time memory values for the SQL statement, such as rows retrieved  3: User-session data   c. Security and resource usage information  4:The stack space   d. Local variables for the process  Which option has the correct match between the memory areas and their contents()
    A

    1-c,2-b,3-d,4-a

    B

    1-c,2-b,3-c,4-a

    C

    1-a,2-b,3-c,4-d

    D

    1-a,2-b,3-d,4-c


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()
    A

    by using triggers

    B

    by using external tables

    C

    by using anonymous PL/SQL blocks

    D

    by auditing all DML operations on the table


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    Which statement correctly describes SQL and /SQL*Plus?()
    A

    Both SQL and /SQL*plus allow manipulation of values in the database.

    B

    /SQL* Plus recognizes SQL satement and sends them to the server; SQL is the Oracle proprietary interface for executing SQL statements.

    C

    /SQL* Plus language for communicating with the Oracle server to access data; SQL recognizes SQL statements and sends them to the server.

    D

    /SQL manipulates data and table definition in the database; /SQL* Plus does not allow manipulation of values in the database.


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    These are points that describe the contents of different memory components:  1: Descriptive information or metadata about schema objects that are queried by using SQL statements  2: The run-time area for data manipulation language (DML) or data definition language (DDL) statements  3: Results of SQL queries and PL/SQL functions  4: Executable forms of SQL cursors, PL/SQL programs, and Java classes  5: The information necessary to reconstruct changes made to the database by a transaction  Which of these will be stored in theShared Poolif the necessary configurations are done()
    A

    1 and 2

    B

    2 and 5

    C

    1,3,and 4

    D

    3,4,and 5

    E

    1,2,3,and 4


    正确答案: B
    解析: 暂无解析

  • 第13题:

    ENCRYPT_TS is an encrypted tablespace that contains tables with data. Which statement is true regarding the effect of queries and data manipulation language (DML) statements on the encrypted data in the tables?()

    • A、The data is decrypted during SORT and JOIN operations.
    • B、The data remains encrypted when it is read into memory.
    • C、The data remains encrypted when it is stored in the redo logs.
    • D、The data remains encrypted in the UNDO tablespace provided that the UNDO tablespace was created with the encryption option enabled.

    正确答案:C

  • 第14题:

    Which  statements are correct about temporary tables()

    • A、Indexes and views can be created on temporary tables.
    • B、Both the data and the structure of temporary tables can be exported.
    • C、Temporary tables are always created in a user’s temporary tablespace.
    • D、The data inserted into a temporary table in a session is available to other sessions.
    • E、Data manipulation language (DML) locks are never acquired on the data of temporary tables

    正确答案:A,C,E

  • 第15题:

    What does the Metadata Application Programming Interface (API) allow you to do?()

    • A、Repair damaged data dictionary entries.
    • B、Delete data dictionary information about database objects you no longer need.
    • C、Extract data definition commands from the data dictionary in a variety of formats.
    • D、Prepare pseudocode modules for conversion to Java or PL/SQL programs with a Metadata code generator

    正确答案:C

  • 第16题:

    Which two statements are true about simple views?()

    • A、Views can be created as read only.
    • B、Views are data segments like tables.
    • C、Views can be created on the basis of more than one table.
    • D、Data manipulation language (DML) operations cannot be performed on views.

    正确答案:A,C

  • 第17题:

    Which three statements are correct about temporary tables?()

    • A、Indexes and views can be created on temporary tables.
    • B、Both the data and the structure of temporary tables can be exported.
    • C、Temporary tables are always created in a user’s temporary tablespace.
    • D、The data inserted into a temporary table in a session is available to other sessions.
    • E、Data manipulation language (DML) locks are never acquired on the data of temporary tables.

    正确答案:A,C,E

  • 第18题:

    You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()

    • A、by using triggers
    • B、by using Data Pump
    • C、by using external tables
    • D、by using anonymous PL/SQL blocks

    正确答案:A

  • 第19题:

    单选题
    ENCRYPT_TS is an encrypted tablespace that contains tables with data. Which statement is true regarding the effect of queries and data manipulation language (DML) statements on the encrypted data in the tables?()
    A

     The data is decrypted during SORT and JOIN operations.

    B

     The data remains encrypted when it is read into memory.

    C

     The data remains encrypted when it is stored in the redo logs.

    D

     The data remains encrypted in the UNDO tablespace provided that the UNDO tablespace was created with the encryption option enabled.


    正确答案: B
    解析: 暂无解析

  • 第20题:

    多选题
    Which  statements are correct about temporary tables()
    A

    Indexes and views can be created on temporary tables.

    B

    Both the data and the structure of temporary tables can be exported.

    C

    Temporary tables are always created in a user’s temporary tablespace.

    D

    The data inserted into a temporary table in a session is available to other sessions.

    E

    Data manipulation language (DML) locks are never acquired on the data of temporary tables


    正确答案: D,E
    解析: 暂无解析

  • 第21题:

    多选题
    Which three statements are correct about temporary tables?()
    A

    Indexes and views can be created on temporary tables.

    B

    Both the data and the structure of temporary tables can be exported.

    C

    Temporary tables are always created in a user’s temporary tablespace.

    D

    The data inserted into a temporary table in a session is available to other sessions.

    E

    Data manipulation language (DML) locks are never acquired on the data of temporary tables.


    正确答案: E,C
    解析: 暂无解析

  • 第22题:

    单选题
    You discover that the schema changes that were recently made to your SQL Server 2005 database have caused your Web site to stop functioning. It is unclear who made the changes. TestKing.com now mandates that all changes to the database schema be tracked. You need to implement a mechanism that will track schema changes in your database.  What should you do?()
    A

    Implement a stored procedure that writes data about schema changes to a log table.

    B

    Implement DDL AFTER triggers that write user and schema information to a log table.

    C

    Implement a DML INSTEAD OF trigger that writes data about schema changes to a log table.

    D

    Implement a DML AFTER trigger that writes data about schema changes to a log table.


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()
    A

    by using triggers

    B

    by using Data Pump

    C

    by using external tables

    D

    by using anonymous PL/SQL blocks


    正确答案: A
    解析: 暂无解析

  • 第24题:

    多选题
    Which two client requests are captured during database replay Capture?() (Choose two)
    A

    Flashback queries

    B

    Shared server requests

    C

    Login and logoff activities of sessions

    D

    Direct path load of data from external files by using utilities such as SQL *loader

    E

    Data definition language (DDL) and data manipulation language (DML) operations


    正确答案: C,E
    解析: 暂无解析