单选题You need to perform certain data manipulation operations through a view called EMP_DEPT_VU, which you previously created. You want to look at the definition of the view (the SELECT statement on which the view was created.) How do you obtain the definit

题目
单选题
You need to perform certain data manipulation operations through a view called EMP_DEPT_VU, which you previously created. You want to look at the definition of the view (the SELECT statement on which the view was created.) How do you obtain the definition of the view?()
A

Use the DESCRIBE command on the EMP_DEPT_VU view.

B

Use the DEFINE VIEW command on the EMP_DEPT_VU view.

C

Use the DESCRIBE VIEW command on the EMP_DEPT_VU view.

D

Query the USER_VIEWS data dictionary view to search for the EMP_DEPT_VU view.

E

Query the USER_SOURCE data dictionary view to search for the EMP_DEPT_VU view.

F

Query the USER_OBJECTS data dictionary view to search for the EMP_DEPT_VU view.


相似考题
更多“You need to perform certain data manipulation operations thr”相关问题
  • 第1题:

    Which of the following statements is NOT true about RMAN?()

    • A、It improves usability by enabling you to reuse the scripts to perform recovery operations.
    • B、It detects block corruption while restoration and recovery operations.
    • C、It enables you to perform block media recovery.
    • D、It is capable to recover through unrecoverable operations, with only full database backups.

    正确答案:A

  • 第2题:

    Server1 contains a folder named D:/Salesdata, which contains important company data. The hardware-monitoring software reports that the disk that contains volume D is in danger of imminent disk failure. You order a replacement disk, but you must wait at least one day for the disk to be delivered. You discover that you do not have a backup of the D:/Salesdata folder because a recent backup was configured incorrectly. You need to back up the D:/Salesdata folder so that you can restore the data if the disk fails. You need to achieve this goal as quickly as possible. What should you do? ()

    • A、Perform a normal backup of the D:/Salesdata folder.
    • B、Perform an incremental backup of the D:/Salesdata folder.
    • C、Perform a differential backup of the D:/Salesdata folder.
    • D、Perform a daily backup of the D:/Salesdata folder.
    • E、Enable Shadow Copies on volume D:/Configure the shadow copy location as C:/.

    正确答案:A

  • 第3题:

    You need to perform a block media recovery on the tools01.dbf data file in the SALES database by using Recovery Manager (RMAN). Which two are the prerequisites to perform this operation? ()(Choose two)

    • A、You must configure block change tracking file
    • B、You must have first level 1 backups for RMAN to restore blocks
    • C、You must ensure that the SALES database is mounted or open
    • D、You must have full or level 0 backups for RMAN to restore blocks
    • E、You must take the tools01.dbf data file offline before you start a block media recovery

    正确答案:C,D

  • 第4题:

    In your database, all the tablespaces are locally managed. You started Recovery Manager (RMAN) using recovery catalog and restored the control file by using the following command: RMAN> RESTORE CONTROLFILE;  Which two operations do you need to perform after restoring the control file from backup?()

    • A、shut down and restart the instance
    • B、add new tempfiles to the temporary tablespaces after recovery
    • C、perform a media recovery and open the database with the RESETLOGS option
    • D、perform a media recovery and bring the database to NOARCHIVELOG mode

    正确答案:B,C

  • 第5题:

    You are using Oracle Database 10g. Which statement regarding an incomplete recovery is true?()

    • A、 You do not need to restore all the data files.
    • B、 You do not need to open the database with the RESETLOGS operation
    • C、 You do not need to perform a full backup after the RESETLOGS operation.
    • D、 You do not need to recover all the data files to the same system change number (SCN).

    正确答案:C

  • 第6题:

    You are the administrator of the TestKing company network. The network consists of a single Active Directory domain named The network includes 20 member servers running Windows Server 2003 and 4 domain controllers running Windows Server 2003. All client computers run Windows XP Professional. A member server named TestKingSrvA functions as a file server. TestKingSrvA has a locally attached tape device. You need to create a backup schedule for TestKingSrvA. All data on TestKingSrvA must be backed up once a week. Every day, you need to back up only the data that was changed after the last weekly backup. You need to minimize the amount of time taken to restore the data in the event of a hardware failure. What should you do? ()(Choose two)()

    • A、Perform a normal backup every week.
    • B、Perform a copy backup every week.
    • C、Perform a differential backup every week.
    • D、Perform an incremental backup every week
    • E、Perform a normal backup every day.
    • F、Perform a copy backup every day.
    • G、Perform a differential backup every day.
    • H、Perform an incremental backup every day.

    正确答案:A,G

  • 第7题:

    You work as the application developer at Certkiller .com. Certkiller .com uses Visual Studio.NET 2005 as its application development platform.You are developing a .NET Framework 2.0 application used to store a type-safe list of names and e-mail addresses. The list will be populated all at ones from the sorted data which means you well not always need to perform insertion or deletion operations on the data. You are required to choose a data structure that optimizes memory use and has good performance.What should you do?()

    • A、 The System.Collections.Generic.SortedList class should be used
    • B、 The System.Collections.HashTable class should be used
    • C、 The System.Collections.Generic.SortedDictionary class should be used
    • D、 The System.Collections.SortedList class should be used

    正确答案:A

  • 第8题:

    单选题
    You need to rename a data file of a tablespace. How would you perform this?()
    A

    A

    B

    B

    C

    C

    D

    D


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    You work as an application developer at CER-Tech.com. Cert-Tech.com uses Visual studio.NET 2005 as its Application Development platform.You are developing a .NET Framework 2.0 application used to store a type-safe list of names and e-mail addresses. The list will be populated all at ones from the sorted data which means you will not always need to perform insertion or deletion operations on the data. You are required to choose a data structure that optimizes memory use and has good performance.What should you do?()
    A

     The System.Collections.Generic.SortedList class should be used 

    B

     The System.Collections.HashTable class should be used

    C

     The System.Collections.Generic.SortedDictionary class should be used 

    D

     The System.Collections.SortedList class should be used


    正确答案: A
    解析: 暂无解析

  • 第10题:

    多选题
    ou need to create a data block for query operations in the RETIRED_EMPLOYEES form module. Which three data sources can you use for this block?()
    A

    vector

    B

    database view

    C

    database table

    D

    transactional trigger

    E

    PL/SQL table of records

    F

    multi-dimensional array


    正确答案: A,E
    解析: 暂无解析

  • 第11题:

    多选题
    Examine the query and its output executed In an RDBMS Instance:Which three statements are true about the users (other than sys) in the output?()
    A

    The C # # B_ADMIN user can perform all backup and recovery operations using RMAN only.

    B

    The C # # C_ADMIN user can perform the data guard operation with Data Guard Broker.

    C

    The C # # A_ADMIN user can perform wallet operations.

    D

    The C # # D_ADMIN user can perform backup and recovery operations for Automatic Storage Management (ASM).

    E

    The C # # B_ADMIN user can perform all backup and recovery operations using RMAN or SQL* Plus.


    正确答案: A,E
    解析: 暂无解析

  • 第12题:

    单选题
    You added a PHONE_NUMBER column of NUMBER data type to an existing EMPLOYEES table. The EMPLOYEES table already contains records of 100 employees. Now, you want to enter the phone numbers of each of the 100 employees into the table. Some of the employees may not have a phone number available. Which data manipulation operation do you perform?()
    A

    MERGE

    B

    INSERT

    C

    UPDATE

    D

    ADD

    E

    ENTER

    F

    You cannot enter the phone numbers for the existing employee records.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    You added a PHONE_NUMBER column of NUMBER data type to an existing EMPLOYEES table. The EMPLOYEES table already contains records of 100 employees. Now, you want to enter the phone numbers of each of the 100 employees into the table. Some of the employees may not have a phone number available. Which data manipulation operation do you perform?()

    • A、MERGE
    • B、INSERT
    • C、UPDATE
    • D、ADD
    • E、ENTER
    • F、You cannot enter the phone numbers for the existing employee records.

    正确答案:C

  • 第14题:

    You need to perform certain data manipulation operations through a view called EMP_DEPT_VU, which you previously created. You want to look at the definition of the view (the SELECT statement on which the view was create.) How do you obtain the definition of the view? ()

    • A、Use the DESCRIBE command in the EMP_DEPT VU view.
    • B、Use the DEFINE VIEW command on the EMP_DEPT VU view.
    • C、Use the DESCRIBE VIEW command on the EMP_DEPT VU view.
    • D、Query the USER_VIEWS data dictionary view to search for the EMP_DEPT_VU view.
    • E、Query the USER_SOURCE data dictionary view to search for the EMP_DEPT_VU view.
    • F、Query the USER_OBJECTS data dictionary view to search for the EMP_DEPT_VU view.

    正确答案:D

  • 第15题:

    You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()

    • A、by using triggers
    • B、by using external tables
    • C、by using anonymous PL/SQL blocks
    • D、by auditing all DML operations on the table

    正确答案:A

  • 第16题:

    You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()

    • A、by using triggers
    • B、by using Data Pump
    • C、by using external tables
    • D、by using anonymous PL/SQL blocks

    正确答案:A

  • 第17题:

    You need to recommend a process for monitoring the servers. The process must meet the  company’s technical requirements.    What should you include in the recommendation?()

    • A、event subscriptions
    • B、Data Collector Sets (DCSs)
    • C、Resource Monitor
    • D、Microsoft System Center Operations Manager

    正确答案:A

  • 第18题:

    You are the administrator of an Active Directory domain named A user reports that he cannot log on to a Windows Server 2003 computer that contains a critical application. You discover that the organizational unit (OU) in which the server is located was deleted. You discover that the user rights for this server are controlled by Group Policy. You need to restore access to the server. You need to achieve this goal by using the minimum amount of administrative effort. What should you do?()

    • A、Perform a normal restoration of the System State data for the domain controller. Force replication.
    • B、Perform an authoritative restoration of the System State data for the domain controller. Mark the OU for replication.
    • C、Re-create the OU that was deleted. Reapply Group Policy, and then add the computer account and any necessary users or groups.
    • D、Perform an Automated System Recovery (ASR) restoration on the domain controller.

    正确答案:B

  • 第19题:

    单选题
    You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()
    A

    by using triggers

    B

    by using Data Pump

    C

    by using external tables

    D

    by using anonymous PL/SQL blocks


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    You need to create a data block for DML operations in the NEW_EMPLOYEE form module. Which data source can you use for this block?()
    A

    REF cursor query. 

    B

    Stored function. 

    C

    From clause query. 

    D

    Transactional trigger.


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information.  Whataction would you take to achieve this task()
    A

    Apply fine-grained auditing.

    B

    Implement value-based auditing.

    C

    Impose standard database auditing to audit object privileges.

    D

    Impose standard database auditing to audit SQL statements.


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()
    A

    by using triggers

    B

    by using external tables

    C

    by using anonymous PL/SQL blocks

    D

    by auditing all DML operations on the table


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    You are using Oracle Database 10g. Which statement regarding an incomplete recovery is true?()
    A

     You do not need to restore all the data files.

    B

     You do not need to open the database with the RESETLOGS operation

    C

     You do not need to perform a full backup after the RESETLOGS operation.

    D

     You do not need to recover all the data files to the same system change number (SCN).


    正确答案: A
    解析: 暂无解析