itgle.com
更多“单选题A user invoking a user-defined function requires which DB2 privilege?()A CALLB USAGEC EXECUTED REFERENCES”相关问题
  • 第1题:

    A user invoking a user-defined function requires which DB2 privilege?()

    • A、CALL
    • B、USAGE
    • C、EXECUTE
    • D、REFERENCES

    正确答案:C

  • 第2题:

    Which of the following DB2 objects are publicly referenced names that require no special authority or privilege to use them?()

    • A、View
    • B、Alias
    • C、Table
    • D、Package

    正确答案:B

  • 第3题:

    All the database users are presently connected to the database instance and working. The HR userhas opened three database sessions and executed the following command in one of his sessions: SQL> UPDATE persons SET ccode=’U031’ WHERE ccode=’U029’; 123 rows updated.  SQL> DELETE FROM persons WHERE exp=’Y’; 3 rows deleted.  The SYS user opens a new session after HR executed the above commands.  Which sessions can seethe effect of the UPDATE and DELETE commands ()

    • A、all sessions of the HR user only
    • B、all sessions of the HR user and the SYS user
    • C、the session of the HR user that executed the commands
    • D、all the sessions for which the database users have access privilege to the PERSONS table

    正确答案:C

  • 第4题:

    Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()

    • A、It can be used to allow the access privilege settings for users but not roles.
    • B、It can be used to allow the access privilege settings for users as well as roles.
    • C、It can be used to control the time interval for which the access privilege is available to a user.
    • D、It can be used to selectively restrict the access for each user in a database to different host computers.
    • E、It can be used to selectively restrict a user's access to different applications in a specific host computer.

    正确答案:B,C,D

  • 第5题:

    Which backup option defines a user-defined name for a backup? ()

    • A、FORMAT
    • B、NAME
    • C、TAG
    • D、FORMAT U%

    正确答案:C

  • 第6题:

    You need to design the restrictions on the Bank.Customers table. Which three actions should you perform?()

    • A、Design a trigger that verifies that the first names and surnames are not empty strings.
    • B、Design a check constraint that verifies that the first names and surnames are not empty strings.
    • C、Design a check constraint that uses a CLR user-defined function to verify that either the phone number is a null value or the format of the phone number is valid.
    • D、Design a trigger that uses a CLR user-defined function to verify that either the phone number is a null value or the format of the phone number is valid.
    • E、Design a check constraint that ensures that the phone number cannot be changed from a valid format to a null value or to an invalid format.
    • F、Design a trigger that ensures that the phone number cannot be changed from a valid format to a null value.

    正确答案:B,C,F

  • 第7题:

    单选题
    A developer wants too use EL to invoke a function using S{my:bloof(“foof”)}. Which is always true?()
    A

     The method invoked by this function must be statie.

    B

     The function class must implement the Function interface.

    C

     The expression is NOT a valid EL expression for invoking a function.

    D

     The function must be declared in a web.xml file using the  element.

    E

     The function class must have a method with the signature:Void bloof (java.lang.Strings)


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    All the database users are presently connected to the database instance and working. The HR user hasopened three database sessions and executed the following command in one of his sessions:SQL> UPDATE persons SET ccode=’U031’ WHERE ccode=’U029’; 123 rows updated.SQL> DELETE FROM persons WHERE exp=’Y’;3 rows deleted. The SYS user opens a new session after HR executed the above commands.  Which sessions can see theeffect of the UPDATE and DELETE commands()
    A

    All sessions of the HR user only

    B

    All sessions of the HR user and the SYS user

    C

    The session of the HR user that executed the commands

    D

    All the sessions for which the database users have access privilege to the PERSONS table


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following DB2 objects are publicly referenced names that require no special authority or privilege to use them?()
    A

    View

    B

    Alias

    C

    Table

    D

    Package


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    A user invoking a user-defined function requires which DB2 privilege?()
    A

    CALL

    B

    USAGE

    C

    EXECUTE

    D

    REFERENCES


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    What is used to execute a task at a particular time against any application on a user-defined schedule with user-defined parameters? ()
    A

     Sets

    B

     Workflow

    C

     Cron Task

    D

     Notification


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    You are designing the loan application process for the customer terminals. You need to design a Transact-SQL stored procedure that fulfills the business and technical requirements. Which type of Transact-SQL stored procedure should you use?()
    A

    one that uses an internal SQL Server Web service endpoint

    B

    one that runs a SQL Server Integration Services (SSIS) package

    C

    one that uses Service Broker

    D

    one that runs a user-defined function


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()

    • A、The database user must be created using DB2 Control Center.
    • B、The database user must be created using the DB2 Command Line Processor.
    • C、The database user may be created using DB2 Control Center or DB2 Command Line Processor.
    • D、The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.

    正确答案:C

  • 第14题:

    Which of the following is a characteristic of a schema?()

    • A、Foreign key references cannot cross schema boundaries.
    • B、A DB2 user must be created before a schema with the same name can be created.
    • C、If no schema is specified when an object is created, the default schema PUBLIC is used.
    • D、A schema enables the creation of multiple objects in a database without encountering namespace collisions.

    正确答案:D

  • 第15题:

    All the database users are presently connected to the database instance and working. The HR user hasopened three database sessions and executed the following command in one of his sessions:SQL> UPDATE persons SET ccode=’U031’ WHERE ccode=’U029’; 123 rows updated.SQL> DELETE FROM persons WHERE exp=’Y’;3 rows deleted. The SYS user opens a new session after HR executed the above commands.  Which sessions can see theeffect of the UPDATE and DELETE commands()

    • A、All sessions of the HR user only
    • B、All sessions of the HR user and the SYS user
    • C、The session of the HR user that executed the commands
    • D、All the sessions for which the database users have access privilege to the PERSONS table

    正确答案:C

  • 第16题:

    Which one is a system privilege?()

    • A、SELECT
    • B、DELETE
    • C、EXECUTE
    • D、ALTER TABLE
    • E、CREATE TABLE

    正确答案:E

  • 第17题:

    You execute the following command toauditdatabase activities:  SQL>AUDITDROP ANY TABLE BY scott BY SESSION WHENEVER SUCCESSFUL;  What is the effect of this command()

    • A、Oneauditrecord is created for every successful DROP TABLE command executed in the session ofSCOTT.
    • B、Oneauditrecord is generated for the session when SCOTT grants the DROP ANY TABLE privilege toother users.
    • C、One audit record is created for the whole session if user SCOTT successfully drops one or more tablesin his session.
    • D、One audit record is created for every session of any other user in which a table owned by SCOTT isdropped successfully.
    • E、One audit record is created for every successful DROP TABLE command executed by any user to droptables owned by SCOTT.

    正确答案:C

  • 第18题:

    单选题
    Which step do you need to perform to enable a user with the SYSDBA privilege to log in as SYSDBA in iSQL*Plus?()
    A

    The user must be granted the database administrator (DBA) privilege.

    B

    The user must be listed in the password file for the authentication.

    C

    No special setup is needed for the user to connect as SYSDBA in iSQL*Plus.

    D

    Set up a user in the Oracle Application Server Containers for J2EE (OC4J) user manager,and grant the webDba role to the user.


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    You execute the following command toauditdatabase activities:  SQL>AUDITDROP ANY TABLE BY scott BY SESSION WHENEVER SUCCESSFUL;  What is the effect of this command()
    A

    Oneauditrecord is created for every successful DROP TABLE command executed in the session ofSCOTT.

    B

    Oneauditrecord is generated for the session when SCOTT grants the DROP ANY TABLE privilege toother users.

    C

    One audit record is created for the whole session if user SCOTT successfully drops one or more tablesin his session.

    D

    One audit record is created for every session of any other user in which a table owned by SCOTT isdropped successfully.

    E

    One audit record is created for every successful DROP TABLE command executed by any user to droptables owned by SCOTT.


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    All the database users are presently connected to the database instance and working. The HR userhas opened three database sessions and executed the following command in one of his sessions: SQL> UPDATE persons SET ccode=’U031’ WHERE ccode=’U029’; 123 rows updated.  SQL> DELETE FROM persons WHERE exp=’Y’; 3 rows deleted.  The SYS user opens a new session after HR executed the above commands.  Which sessions can seethe effect of the UPDATE and DELETE commands ()
    A

    all sessions of the HR user only

    B

    all sessions of the HR user and the SYS user

    C

    the session of the HR user that executed the commands

    D

    all the sessions for which the database users have access privilege to the PERSONS table


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    Which UTM feature requires a license to function?()
    A

    integrated Web filtering

    B

    local Web filtering

    C

    redirect Web filtering

    D

    content filtering


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following is a characteristic of a schema?()
    A

    Foreign key references cannot cross schema boundaries.

    B

    A DB2 user must be created before a schema with the same name can be created.

    C

    If no schema is specified when an object is created, the default schema PUBLIC is used.

    D

    A schema enables the creation of multiple objects in a database without encountering namespace collisions.


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    Which backup option defines a user-defined name for a backup? ()
    A

    FORMAT

    B

    NAME

    C

    TAG

    D

    FORMAT U%


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
    A

    The database user must be created using DB2 Control Center.

    B

    The database user must be created using the DB2 Command Line Processor.

    C

    The database user may be created using DB2 Control Center or DB2 Command Line Processor.

    D

    The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.


    正确答案: D
    解析: 暂无解析