Which DBMS_SCHEDULER procedure(s) can be used to alter an ex

题目
多选题
Which DBMS_SCHEDULER procedure(s) can be used to alter an existing job? ()
A

SET_ATTRIBUTE_NULL

B

ALTER_JOB

C

ALTER_JOB_PARAMETERS

D

ALTER

E

SET_ATTRIBUTE

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which DBMS_SCHEDULER procedure(s) can be used to alter an existing job? ()

A. SET_ATTRIBUTE_NULL

B. ALTER_JOB

C. ALTER_JOB_PARAMETERS

D. ALTER

E. SET_ATTRIBUTE


参考答案:A, E

第2题:

Which two statements are true regarding the USING clause in table joins?()

  • A、It can be used to join a maximum of three tables 
  • B、It can be used to restrict the number of columns used in a NATURAL join 
  • C、It can be used to access data from tables through equijoins as well as nonequijoins 
  • D、It can be used to join tables that have columns with the same name and compatible data types

正确答案:B,D

第3题:

The _____ specification delineates specific end use capabilities which can be tested in the acceptance procedure.

A performance

B functional

C technical

D base line

E operational


正确答案:B

第4题:

which one of the following accurately describes field names?()

  • A、they must be unique in a database  
  • B、they can only be used once in a view  
  • C、they can only used once on each form  
  • D、they can be used mulriple times on a form 

正确答案:C

第5题:

Which of the following commands should be used to alter the routing table on a running system without affecting the ODM settings?()

  • A、inetd
  • B、route
  • C、cfgmgr
  • D、chdev

正确答案:B

第6题:

Which DBMS_SCHEDULER procedures can be used to enable a program?()

A. ENABLE启用

B. ENABLE_PROGRAM

C. VALIDATE_PROGRAM

D. SET_ATTRIBUTE设置属性

E. SET_ENABLED


参考答案:A, D

第7题:

Such changes can alter the social structure,()people to move.

  • A、which leading
  • B、leads
  • C、which led
  • D、leading

正确答案:D

第8题:

In John Whitehead's opinion, which statement is true?

A.Face recognition technology may interfere with people's privacy.

B.Face recognition technology may enhance the country's constant surveillance.

C.Face recognition technology can be used in the same way wiretaps are used.

D.Face recognition technology can be used after its threat has been removed.


正确答案:A
解析:文章最后一段最后一句话“After all,that is exactly what constant surveillance is—the ultimate implied threat of coercion.”这是约翰博士的观点,这项技术威胁到美国每个公民参与社会的权利。所以A、“会干扰人们的隐私”,是正确答案。

第9题:

In the context of Advanced Power Virtualization, the shared pool refers to which of the following?()

  • A、A pool of physical memory that can be used by any partition
  • B、A pool of physical processors that can be used by any virtual or dedicated partition
  • C、A pool of physical memory that can be used by multiple Micro-Partitions
  • D、A pool of physical processors that can be used by multiple Micro-Partitions

正确答案:D

第10题:

Which command is used to open the database after an incomplete recovery?()

  • A、 alter database open
  • B、 alter database open repairlog
  • C、 alter database open resetlogs
  • D、 alter database open resetlog
  • E、 alter database resetlogs open

正确答案:C

更多相关问题