Note the points about data dictionary views and dynamic perf

题目
单选题
Note the points about data dictionary views and dynamic performance views:  1.These are stored in the SYSTEM tablespace.  2.These are the based on the virtual tables.  3.These are owned by the SYSuser.  4.These can be queried by a normal user only if O7_DICTIONARY_ACCESSIBILTY parameter is set toTRUE.  5.V$FIXED_TABLE view can be queried to list the names of these views.  Which statements listed describe the data dictionary views()
A

1 and 3

B

2,3,and 5

C

1,2,and 3

D

2,3,4,and 5

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A data( )is a file that contains metadata—that is,data about data.

A.structure

B.table

C.base

D.dictionary


正确答案:D
解析:数据字典就是包含元数据的文件,即关于数据的数据。

第2题:

●A (72) is a file that contains metadata—that is,data about data.

(72)A.document

B.Excel table

C. database

D.data dictionary


正确答案:D

第3题:

●( 72) is a file that contains metadata-that is, data about data.

●(72) A. document

B. Excel table

C. database

D. data dictionary


正确答案:D

第4题:

Which two statements are true about the Automatic Workload Repository (AWR)()

  • A、All AWR tables belong to the SYSTEM schema.
  • B、The AWR contains systemwide tracing and logging information.
  • C、The snapshots collected by the AWR are accessible through data dictionary views.
  • D、The snapshots collected by the AWR are used by self-tuning components in the database.

正确答案:C,D

第5题:

The Company is concerned about Layer 2 security threats.  Which statement is true about these  threats? ()

  • A、 MAC spoofing attacks allow an attacking device to receive frames intended for a different  network host.
  • B、 Port scanners are the most effective defense against dynamic ARP inspection.
  • C、 MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable  attack points.
  • D、 Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP  snooping attacks.
  • E、 DHCP snooping sends unauthorized replies to DHCP queries.
  • F、 ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.
  • G、 None of the other alternatives apply.

正确答案:A

第6题:

A (72) is a file that contains metadata—that is,data about data.

A.document

B.Excel table

C. database

D.data dictionary


正确答案:D
数据字典是一个包含了元数据的文件,元数据是关于数据的数据。

第7题:

A data ( ) is a file that contains metadata - that is, data about data.

A .structure
B .table
C .base
D .dictionary

答案:D
解析:
数据字典就是包含元数据的文件,即关于数据的数据。

第8题:

Which two statements about the SQL Management Base (SMB) are true?()

A. It contains only SQL profiles generated by SQL Tuning Advisor.

B. It stores plans generated by the optimizer using a stored outline.

C. It is part of the data dictionary and stored in the SYSAUX tablespace.

D. It is part of the data dictionary and stored in the SYSTEM tablespace.

E. It contains the statement log, the plan history, plan baselines, and SQL profiles.


参考答案:C, E

第9题:

You need to perform certain data manipulation operations through a view called EMP_DEPT_VU, which you previously created. You want to look at the definition of the view (the SELECT statement on which the view was create.) How do you obtain the definition of the view? ()

  • A、Use the DESCRIBE command in the EMP_DEPT VU view.
  • B、Use the DEFINE VIEW command on the EMP_DEPT VU view.
  • C、Use the DESCRIBE VIEW command on the EMP_DEPT VU view.
  • D、Query the USER_VIEWS data dictionary view to search for the EMP_DEPT_VU view.
  • E、Query the USER_SOURCE data dictionary view to search for the EMP_DEPT_VU view.
  • F、Query the USER_OBJECTS data dictionary view to search for the EMP_DEPT_VU view.

正确答案:D

第10题:

Which  statements are correct about temporary tables()

  • A、Indexes and views can be created on temporary tables.
  • B、Both the data and the structure of temporary tables can be exported.
  • C、Temporary tables are always created in a user’s temporary tablespace.
  • D、The data inserted into a temporary table in a session is available to other sessions.
  • E、Data manipulation language (DML) locks are never acquired on the data of temporary tables

正确答案:A,C,E

更多相关问题