You have two tables with referential integrity enforced between them. You need to insert data to
thechild table first because it is going to be a long transaction and data for the parent table will be available ina later stage, which can be inserted as part of the same transaction. View the Exhibit to examine the commands used to create tables.
Which action would you take to delay the referential integrity checking until the end of the transaction()
A.Set the constraint to deferred before starting the transaction.
B.Alter the constraint to NOVALIDATE state before starting the transaction.
C.Enable the resumable mode for the session before starting the transaction.
D.Set the COMMIT_WAIT parameter to FORCE_WAIT for the session before starting the transaction.
您可能感兴趣的试卷
你可能感兴趣的试题
You execute this command to drop the ITEM table, which has the primary key referred in the ORDERtable:
SQL> DROP TABLE scott.item CASCADE CONSTRAINTS PURGE;
Which two statements are true about the effect of the command()
A.No flashback is possible to bring back the ITEM table.
B.The ORDER table is dropped along with the ITEM table.
C.The dependent referential integrity constraints in the ORDER table are disabled.
D.The dependent referential integrity constraints in the ORDER table are removed.
E.The table definition of the ITEM table and associated indexes are placed in the recycle bin.
A.The corresponding indexes for the table are also truncated.
B.Delete triggers on the table are fired during the execution of the TRUNCATE command.
C.The child table is truncated when the TRUNCATE command is applied on the parent table.
D.The high-water mark (HWM) is set to point to the first usable data block in the table segment.
E.No undo or very little undo data is generated during the execution of the TRUNCATE command
Which statement is true about the PCTFREE setting for the table()
A.It sets the minimum percentage of a data block to be reserved to contain chained rows from other blocks.
B.It sets the minimum percentage of a data block to be reserved as free space before the server prevents inserts into the block.
C.It sets the minimum percentage of a data block to be reserved to contain the bitmap used to maintain the free block information.
D.It sets the minimum percentage of a block that can be used for row data plus overhead before new rows are added to the block.
Examine the command that is used to create a table:
SQL> CREATE TABLE orders(oid NUMBER(6) PRIMARY KEY, odate DATE, ccode NUMBER(6), oamt NUMBER(10,2)) TABLESPACE users;
Which two statements are true about the effect of the above command) ()
A.A CHECK constraint is created on the OID column.
B.A NOT NULL constraint is created on the OID column.
C.The ORDERS table is the only object created in the USERS tablespace.
D.The ORDERS table and a unique index are created in the USERS tablespace.
E.The ORDERS table is created in the USERS tablespace and a unique index is created on the OIDcolumn in the SYSTEM tablespace.
You want to access employee details contained in flat files as part of the EMPLOYEE table. You planto add a new column to the EMPLOYEE table to achieve this.
Which data type would you use for the new column()
A.CLOB
B.BLOB
C.BFILE
D.LONG RAW
You created a profile APP_USER and assigned it to the users. After a month, you decide to drop theprofile.Some user sessions are currently connected to the database instance and are using the APP_USERprofile. This command is used to drop the profile: SQL> DROP PROFILE app_user;
Which statement describes the result()
A.The command produces an error.
B.The profile is dropped and current user sessions use the DEFAULT profile immediately.
C.The profile is dropped and only the subsequent user sessions use the DEFAULT profile.
D.The profile is dropped, the sessions are terminated, and the subsequent user sessions use theDEFAULT profile.
In your database instance, the user sessions are connected to the database server from the remotemachines. You want to achieve the following for these users:
1:The user account must be locked after four unsuccessful login attempts.PASSWORD_LOCK_TIME
2:The user must be prompted to change the password at regular intervals.PASSWORD_LIFE_TIME
3:The user may not have more than three simultaneous sessions.SESSIONS_PER_USER
4:The user session must automatically be logged off if more than 10 minutes elapsed time used.CONNECT_TIME
How would you accomplish the above()
A.by assigning profiles for the users
B.by implementing Fine-Grained Auditing (FGA)
C.by granting a secure application role to the users
D.by implementing the Database Resource Manager plan
View the Exhibit to observe the roles assigned to the SLP_REP user.
Which statement is true about the assignment of the SELECT_CATALOG_ROLE role to the SLP_REPuser()
A.The user must enable the role explicitly.
B.The user can grant the role to other users.
C.The user cannot use the role until the DBA enables it explicitly.
D.The user can start using the role immediately without any changes.
View the Exhibit and examine the user information.
The user has been granted CONNECT and RESOURCE roles and no individual system privileges. TheSL_REP user executes this command to create a table:
SQL> CREATE TABLE orders(oid number(6), odate date, ccode number(4), oamt number(10,2)) TABLESPACE purchase_space;
The PURCHASE_SPACE tablespace already exists in the database.
Which statement describes theeffect of the command()
A.The command executes successfully and creates the table in the USERS tablespace.
B.The command executes successfully and creates the table in the PURCHASE_SPACE tablespace.
C.The command produces an error because the user does not have the privilege to create the table.
D.The command produces an error because the user does not have quota in the PURCHASE_SPACE tablespace.
You want to create a role to meet these requirements:
1:The role is to be protected from unauthorized usage.
2:The password of the role is not to be embedded in the application source code or stored in a table.
Which method would you use to restrict enabling of such roles()
A.Create the role with global authentication.
B.Create the role with external authentication.
C.Create the role as a secure application role.
D.Create the role as a password-protected role.
E.Create a role and use Fine-Grained Access Control (FGAC) to secure the role.
最新试题
Your database instance is running with full workload after database creation. You have decided to use a fixed-size undo tablespace. You want to use the Undo Advisor to estimate the capacity of the undo tablespace.Which two factors must you consider before using the Undo Advisor to estimate the capacity of the undotablespace()
Automatic Shared Memory Management is disabled for your database instance. You realize that there arecases of SQL statements performing poorly because of repeated parsing activity, resulting in degradation ofperformance. What would be your next step to improve performance()
Which statements are true regarding the Oracle Data Pump export and import operations()
The session of user SCOTT receives the following error after executing an UPDATE command on the EMPtable:ERROR at line 1:ORA-00060: deadlock detected while waiting for resource On investigation, you find that a session opened byuser JIM has a transaction that caused the deadlock. Which two statements are true regarding the session ofSCOTT in this scenario()
You execute the following command to change the status of the SALES tablespace:SQL> ALTER TABLESPACE sales OFFLINE;Which statements describe the effect of the command()
Which statements are true regarding listeners()
In a new installation of Oracle Database 11g, you perform these activities:1. Organize software and data on different subdirectories to avoid poor performance.2. Use consistent naming conventions for database files.3. Separate administrative information pertaining to the database in different directories. Which optioncorresponds to the type of activities you performed()
Identify the situations in which you use the alert log file in your database to check the detail.()
You have set Tablespace Full Metrics Threshold values for the USERS tablespace as follows:Warning (%): 90Critical (%): 95Which background process is responsible for issuing alerts when the threshold is crossed()
You set the following parameters in the parameter file and restarted the database:MEMORY_MAX_TARGET=0MEMORY_TARGET=500MPGA_AGGREGATE_TARGET=90MSGA_TARGET=270MWhich two statements are true about these parameters after the database instance is restarted()