多项选择题
Examine the following commands for redefining a table with Virtual Private Database (VPD) policies:
Which two statements are true about redefining the table?()
A. All the triggers for the table are disabled without changing any of the column names or column types in the table.
B. The primary key constraint on the EMPLOYEES table is disabled during redefinition.
C. VPD policies are copied from the original table to the new table during online redefinition.
D. You must copy the VPD policies manually from the original table to the new table during online redefinition.
相关考题
-
单项选择题
Given classes defined in two different files: What is required at line 5 in class SomeApp to use the process method of BitUtils?()
A.process(bytes);
B.BitUtils.process(bytes);
C.util.BitUtils.process(bytes);
D.SomeApp cannot use methods in BitUtils.
E.import util.BitUtils.*; process(bytes); -
单项选择题
YouworkasadatabaseadministratorforCertkiller.com.YoufindthatuserswithDBAroleareusingmoreCPUresourcesthanwhatisallocatedintheirprofiles.Whichactionwouldyoutaketoensurethatresourceslimitsareimposedontheseusers?()
A.Assign the DEFAULT profile to the users
B.Set the RESOURCE_LIMIT parameter to TRUE in the parameter file
C.Create a new profile with CPU restrictions and assign it to the users
D.Specify the users as members of the DEFAULT_CONSUMER_GROUP
E.Revoke the DBA role and grant CONNECT and RESOURCE role to the users -
单项选择题
Whichtoolorinterfaceisusedtoconfiguredebugparametersforlogfiles?()
A.license information
B.Alarm and Trace Configuration
C.CRS Installer
D.Control Center
