单选题john has created a database library, librarians are responsible for adding new information to the db library. which one of the following minimum level of access he can grant the librarians of the db library?()AreaderBauthorCmanagerDdesigner

题目
单选题
john has created a database library, librarians are responsible for adding new information to the db library. which one of the following minimum level of access he can grant the librarians of the db library?()
A

 reader

B

 author

C

 manager

D

 designer


相似考题
更多“单选题john has created a database library, librarians are responsible for adding new information to the db library. which one of the following minimum level of access he can grant the librarians of the db library?()A  readerB  authorC  managerD  designer”相关问题
  • 第1题:

    A new company has been given one public IP address. The company employs 200 users requiring Internet access from the headquarters. Which of the following can be implemented to provide Internet access for all the employees?()

    • A、Multicasting
    • B、Proxy server
    • C、NAT
    • D、Subnetting

    正确答案:C

  • 第2题:

    Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()

    • A、The database user must be created using DB2 Control Center.
    • B、The database user must be created using the DB2 Command Line Processor.
    • C、The database user may be created using DB2 Control Center or DB2 Command Line Processor.
    • D、The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.

    正确答案:C

  • 第3题:

    Which one of the following provides the capability to partition the 3584 Tape Library into separatelogical libraries?()

    • A、Control Path Failover 
    • B、Enhanced Frame Control 
    • C、Advanced Library Management System 
    • D、High Availability Library Control

    正确答案:C

  • 第4题:

    You are analyzing how Oracle processes user statements. SQL and PL/SQL parse information is stored in which of the following database memory areas? ()

    • A、Library cache 
    • B、Row cache
    • C、Dictionary cache 
    • D、Large area 
    • E、Buffer cache

    正确答案:B

  • 第5题:

    Records from the data dictionary information are stored in which of the following database memory areas?()

    • A、Library cache 
    • B、Row cache 
    • C、Session UGA 
    • D、Buffer cache

    正确答案:B

  • 第6题:

    单选题
    A new company has been given one public IP address. The company employs 200 users requiring Internet access from the headquarters. Which of the following can be implemented to provide Internet access for all the employees?()
    A

    Multicasting

    B

    Proxy server

    C

    NAT

    D

    Subnetting


    正确答案: C
    解析: 暂无解析

  • 第7题:

    单选题
    You work as an application developer at Certkiller .com. Certkiller .com has been hired by a small local private school to develop a class library that will be used in an application named ManageAttendance for the purpose of managing student records.You are responsible for developing this class library. Certkiller .com has instructed you to create a collection in the application to store learners’ results. The school has informed you that they currently only have seven learners, but that this value will triple in the following year. Due to the limited resources, you need to ensure that the collection you create consumes a minimum amount of resources. What should you use to create the collection?()
    A

     The HybridDictionary collection class.

    B

     The HashTable collection class.

    C

     The ListDictionary collection class.

    D

     The StringCollection collection class.


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    john has created a database library, librarians are responsible for adding new information to the db library. which one of the following minimum level of access he can grant the librarians of the db library?()
    A

     reader

    B

     author

    C

     manager

    D

     designer


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    A full backup of your database named DB1 is created automatically at midnight every day. Differential backups of DB1 occur twice each day at 10:00 and at 16:00. A database snapshot is created every day at noon. A developer reports that he accidentally dropped the Pricelist table in DB1 at 12:30. The last update to Pricelist occurred one week ago. You need to recover the Pricelist table. You want to achieve this goal by using the minimum amount of administrative effort. You must also minimize the amount of data that is lost. What should you do?()
    A

     Restore the most recent backup into a new database named DB1bak. Apply the most recent differential backup. Copy the Pricelist table from DB1bak to DB1. 

    B

     Delete all database snapshots except the most recent one. Restore DB1 from the most recent database snapshot. 

    C

     Recover DB1 from the most recent backup. Apply the most recent differential backup. 

    D

     Copy the Pricelist table from the most recent database snapshot into DB1.


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    An administrator is up grading the back up server from a single tape drive to a SCSI tape library. The library has been unpackaged, mounted, and the library drivers installed.  Which of the following items should the administrator have to connect the device to the backup server?()
    A

     SCSI cable

    B

     SCSI interface adapter on the tape library

    C

     SCSI termination card on the server

    D

     iSCSI cable


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    You have a server that runs Windows Server 2008. The server has the Windows SharePoint Services (WSS) server role installed. The server is configured to accept incoming e-mail. You create a new document library.  You need to ensure that any user can send e-mail to the document library. What should you do?()
    A

    Modify the RSS setting for the document library.

    B

    Modify the permissions for the document library.

    C

    Modify the incoming e-mail settings for the document library.

    D

    Enable anonymous authentication for the Web application.


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
    A

    The database user must be created using DB2 Control Center.

    B

    The database user must be created using the DB2 Command Line Processor.

    C

    The database user may be created using DB2 Control Center or DB2 Command Line Processor.

    D

    The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    An administrator is up grading the back up server from a single tape drive to a SCSI tape library. The library has been unpackaged, mounted, and the library drivers installed.  Which of the following items should the administrator have to connect the device to the backup server?()

    • A、 SCSI cable
    • B、 SCSI interface adapter on the tape library
    • C、 SCSI termination card on the server
    • D、 iSCSI cable

    正确答案:A

  • 第14题:

    john has created a database library, librarians are responsible for adding new information to the db library. which one of the following minimum level of access he can grant the librarians of the db library?()

    • A、 reader
    • B、 author
    • C、 manager
    • D、 designer

    正确答案:D

  • 第15题:

    You are adding redo logs to the Oracle database. Creating a new redo log adds information to which of the following Oracle resources? ()

    • A、Shared pool 
    • B、Control file 
    • C、SGA 
    • D、PGA

    正确答案:B

  • 第16题:

    You are part of the DBA team working for a multinational bank. The team is responsible for performing administrative tasks on the database server located at the home office. The database server at the home office has a production database and a test database named TESTDB. The test database is primarily used for testing database commands and configuration settings befor implementing these settings on the production database. The test database is also used for the development of database applications. You have been asked by the senior DBA to grant the SYSDBA privilege to a new team member, John, so that he can perform some administrative tasks, such as shutdown and startup operations, on TESTDB. You use the password file to configure remote authentication on the TESTDB database. You execute the following statement to grant the SYSDBA privilege to John:   SQL>GRANT SYSDBA TO john;   However, you receive the following error:   ORA-01996: GRANT failed: password file   ’c:/oracle/ora9i/dbs/testdb.pwd’ is full   Which action should you take to add the user john to the password file without removing any of the existing users?()

    • A、 Create another password file and then re-execute the GRANT statement.
    • B、 Re-create the password file, specifying a larger number of allowed entries, and then re-execute the GRANT statement.
    • C、 Change the value of the REMOTE_LOGIN_PASSWORDFILE initialization parameter in theinitialization parameter file to NONE and then re-execute the GRANT statement.
    • D、 Change the value of the REMOTE_LOGIN_PASSWORDFILE initialization parameter in the initialization parameter file to SHARED and then re-execute the GRANT statement.

    正确答案:B

  • 第17题:

    A full backup of your database named DB1 is created automatically at midnight every day. Differential backups of DB1 occur twice each day at 10:00 and at 16:00. A database snapshot is created every day at noon. A developer reports that he accidentally dropped the Pricelist table in DB1 at 12:30. The last update to Pricelist occurred one week ago. You need to recover the Pricelist table. You want to achieve this goal by using the minimum amount of administrative effort. You must also minimize the amount of data that is lost. What should you do?()

    • A、 Restore the most recent backup into a new database named DB1bak. Apply the most recent differential backup. Copy the Pricelist table from DB1bak to DB1. 
    • B、 Delete all database snapshots except the most recent one. Restore DB1 from the most recent database snapshot. 
    • C、 Recover DB1 from the most recent backup. Apply the most recent differential backup. 
    • D、 Copy the Pricelist table from the most recent database snapshot into DB1.

    正确答案:D

  • 第18题:

    单选题
    You are part of the DBA team working for a multinational bank. The team is responsible for performing administrative tasks on the database server located at the home office. The database server at the home office has a production database and a test database named TESTDB. The test database is primarily used for testing database commands and configuration settings befor implementing these settings on the production database. The test database is also used for the development of database applications. You have been asked by the senior DBA to grant the SYSDBA privilege to a new team member, John, so that he can perform some administrative tasks, such as shutdown and startup operations, on TESTDB. You use the password file to configure remote authentication on the TESTDB database. You execute the following statement to grant the SYSDBA privilege to John:   SQL>GRANT SYSDBA TO john;   However, you receive the following error:   ORA-01996: GRANT failed: password file   ’c:/oracle/ora9i/dbs/testdb.pwd’ is full   Which action should you take to add the user john to the password file without removing any of the existing users?()
    A

     Create another password file and then re-execute the GRANT statement.

    B

     Re-create the password file, specifying a larger number of allowed entries, and then re-execute the GRANT statement.

    C

     Change the value of the REMOTE_LOGIN_PASSWORDFILE initialization parameter in theinitialization parameter file to NONE and then re-execute the GRANT statement.

    D

     Change the value of the REMOTE_LOGIN_PASSWORDFILE initialization parameter in the initialization parameter file to SHARED and then re-execute the GRANT statement.


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    Which one of the following provides the capability to partition the 3584 Tape Library into separatelogical libraries?()
    A

    Control Path Failover 

    B

    Enhanced Frame Control 

    C

    Advanced Library Management System 

    D

    High Availability Library Control


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    An application that needs to use a shared library has a deployment descriptor that only specifies the Specification-Version and Extension-Name of the shared library. When the application is deployed, which shared library will be used?()
    A

    The application will go into an ADMIN state and fail to deploy because the Implementation- Version is required.

    B

    The application will be deployed but the classes in the shared library will not be available.

    C

    If you are using the WebLogic Admin Console, you will be prompted for the version you want to  use; otherwise, the application will fail to deploy.

    D

    If there are multiple versions of the shared library deployed, WebLogic will use the one with the highest Implementation-Version.

    E

    If there are multiple versions of the shared library deployed, WebLogic will use the one that was  deployed most recently.


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    You are adding redo logs to the Oracle database. Creating a new redo log adds information to which of the following Oracle resources? ()
    A

    Shared pool 

    B

    Control file 

    C

    SGA 

    D

    PGA


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    You are managing an Oracle Database 10g database that uses Oracle Managed Files (OMF). You enabled the block change tracking feature for the database. Which statement regarding the change tracking file is true?()
    A

     One block change tracking file is created for each data file. By default, the file is created in DB_CREATE_FILE_DEST.

    B

     One block change tracking file is created for each data file. By default, the file is created in BACKGROUND_DUMP_DEST.

    C

     One block change tracking file is created for the database. By default, the file is created in DB_CREATE_FILE_DEST.

    D

     One block change tracking file is created for the database. By default, the file is created in BACKGROUND_DUMP_DEST.


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    You are a systems administrator responsible for securing a Windows Server 2008 Web server. You havecreated a new Web site called Contoso Intranet that will contain seven Web applications. One of theapplication developers has told you that her Web application requires a new request handler that isprocessed using a .NET library her team created. How can you meet these requirements while also maximizing security for the server?()
    A

    Add a new managed handler to the Contoso Intranet Web site.

    B

    Add a new managed handler for the specific Web application that requires it.

    C

    Add a new module mapping to the Contoso Intranet Web site.

    D

    Add a new module mapping for the specific Web application that requires it.


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    A

    They can buy new books.

    B

    They can change to a computer system.

    C

    They can change the librarians there.

    D

    They can reprint all the cards.


    正确答案: D
    解析:
    细节题。针对第一个问题,女士提到“We can either check all the cards and reprint them where necessary, or we can change to a computer system”,即可以检查所有卡片,有必要的话重新印刷,或者改用电脑系统。故选B。