CALL
USAGE
EXECUTE
REFERENCES
Which of the following is a characteristic of a schema?()A、Foreign key references cannot cross schema boundaries.B、A DB2 user must be created before a schema with the same name can be created.C、If no schema is specified when an object is created, the default schema PUBLIC is used.D、A schema enables the creation of multiple objects in a database without encountering namespace collisions.
点击查看答案
All the database users are presently connected to the database instance and working. The HR userhas opened three database sessions and executed the following command in one of his sessions: SQL> UPDATE persons SET ccode=’U031’ WHERE ccode=’U029’; 123 rows updated. SQL> DELETE FROM persons WHERE exp=’Y’; 3 rows deleted. The SYS user opens a new session after HR executed the above commands. Which sessions can seethe effect of the UPDATE and DELETE commands ()A、all sessions of the HR user onlyB、all sessions of the HR user and the SYS userC、the session of the HR user that executed the commandsD、all the sessions for which the database users have access privilege to the PERSONS table
All the database users are presently connected to the database instance and working. The HR user hasopened three database sessions and executed the following command in one of his sessions:SQL> UPDATE persons SET ccode=’U031’ WHERE ccode=’U029’; 123 rows updated.SQL> DELETE FROM persons WHERE exp=’Y’;3 rows deleted. The SYS user opens a new session after HR executed the above commands. Which sessions can see theeffect of the UPDATE and DELETE commands()A、All sessions of the HR user onlyB、All sessions of the HR user and the SYS userC、The session of the HR user that executed the commandsD、All the sessions for which the database users have access privilege to the PERSONS table
Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()A、It can be used to allow the access privilege settings for users but not roles.B、It can be used to allow the access privilege settings for users as well as roles.C、It can be used to control the time interval for which the access privilege is available to a user.D、It can be used to selectively restrict the access for each user in a database to different host computers.E、It can be used to selectively restrict a user's access to different applications in a specific host computer.
Which one is a system privilege?()A、SELECTB、DELETEC、EXECUTED、ALTER TABLEE、CREATE TABLE
Which backup option defines a user-defined name for a backup? ()A、FORMATB、NAMEC、TAGD、FORMAT U%
You execute the following command toauditdatabase activities: SQL>AUDITDROP ANY TABLE BY scott BY SESSION WHENEVER SUCCESSFUL; What is the effect of this command()A、Oneauditrecord is created for every successful DROP TABLE command executed in the session ofSCOTT.B、Oneauditrecord is generated for the session when SCOTT grants the DROP ANY TABLE privilege toother users.C、One audit record is created for the whole session if user SCOTT successfully drops one or more tablesin his session.D、One audit record is created for every session of any other user in which a table owned by SCOTT isdropped successfully.E、One audit record is created for every successful DROP TABLE command executed by any user to droptables owned by SCOTT.