A 加密触发器文本
B加密定义触发器的数据库
C 加密定义触发器的数据库的数据
D 以上都不对
第1题:
A user needs to create a trigger that will update table T2 whenever a row is added to table T1. Assuming the user has all appropriate privileges for table T2, which privilege is required on table T1 to create the trigger?()
A.REFERENCES
B.SELECT
C.UPDATE
D.ALTER
第2题:
A.MAXFILES
B.MAXLOGFILE
C.MAXLOGFILES
D.LOGFILES
第3题:
A storage specialist needs to automate some tasks triggered in the event of disaster recovery. What is the best solution to accomplish this()
第4题:
为了使用输出参数,需要在CREATE PROCEDURE语句中指定关键字()。
第5题:
在《庄子·秋水》“夏虫不可以语于冰者,笃于时也”句中,后一个“于”的词性是(),其语法作用是()。
第6题:
A user needs to create a trigger that will update table T2 whenever a row is added to table T1. Assuming the user has all appropriate privileges for table T2, which privilege is required on table T1 to create the trigger?()
第7题:
Your company uses a SQL Server 2005 database. Customer data from your trading partners is imported into the Customers table every night. You need to ensure that the customer record is updated if it already exists in the Customers table. If the record does not exist, the data needs to be inserted into the Customers table. What should you do?()
第8题:
Name
Filename
Filegrowth
Size
第9题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption
第10题:
MAXFILES
MAXLOGFILE
MAXLOGFILES
LOGFILES
第11题:
OPTION
OUTPUT
CHECK
DEFAULT
第12题:
对
错
第13题:
在创建数据库的Create Database语句中()参数可以指定数据或事务日志文件的初始大小。
A.Name
B.Filename
C.Filegrowth
D.Size
第14题:
「の」接在体言后面,在句中作连体修饰语,表示领属关系属性等。一般译为「的」。
第15题:
下列()语句用于删除触发器。
第16题:
下面语句中,()语句用来修改视图。
第17题:
What three tasks are required to add a CRS application?()
第18题:
Which two statements regarding asymmetric key encryption are true?()
第19题:
Create a FOR trigger.
Create an INSTEAD OF trigger.
Create an AFTER trigger.
Create a DDL trigger.
第20题:
using the DS GUI, step through Real Time Manager, Copy Services, Create custom scripts; actions and event conditions can be defined that triggerthe script; there is no need for a password
create a shell script usingdscli commands; trigger the script from the operating system, and call the script using the -pwd option with the password
create a password file; create a shell script using dscli commands; trigger the script from the operating system
create a password file; create a shell script usingdscli commands; trigger the script from the operating system; call the dscli script with the dscli -script
第21题:
TRIG_A
TRIG_B
TRIG_C
TRIG_D
第22题:
You cannot create a table form within Forms.
You must use the FORMS_DDL built-in to create the table.
You must use the DBMS_DYNAMIC_DDL package to create the table.
You can write the CREATE TABLE statement directly into the trigger.
第23题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption.