更多"Which three of the statements below"的相关试题:
[多项选择]Which three statements correctly describe the functions and use of constraints? ()
A. Constraints provide data independence.
B. Constraints make complex queries easy.
C. Constraints enforce rules at the view level.
D. Constraints enforce rules at the table level.
E. Constraints prevent the deletion of a table if there are dependencies.
F. Constraints prevent the deletion of an index if there are dependencies.
[多项选择]Which three statements correctly describe the features of the I/O calibration process?()
A. Only one I/O calibration process can run at a time.
B. It automates the resource allocation for the Automated Maintenance Tasks.
C. It improves the performance of the performance-critical sessions while running.
D. It can be used to estimate the maximum number of I/Os and maximum latency time for the system.
E. The latency time is computed only when the TIMED_STATISTICS initialization parameter is set to TRUE.
[多项选择]Which three statements correctly describe the Cisco Validated Designs program? ()(Choose three.)
A. includes three design levels
B. incorporates products and technologies into enterprise, service provider, and commercial systems
C. extends the value of designs through a sustained development plan
D. does not factor customer input design process
E. facilitates faster and more reliable customer deployments
F. incorporates a narrow range of technologies and products
[多项选择]Which four statements correctly describe functions that are available in SQL?()
A. INSTR returns the numeric position of a named character.
B. NVL2 returns the first non-null expression in the expression list.
C. TRUNCATE rounds the column, expression, or value to n decimal places.
D. DECODE translates an expression after comparing it to each search value.
E. TRIM trims the heading of trailing characters (or both) from a character string.
F. NVL compares two expressions and returns null if they are equal, or the first expression of they are not equal.
G. NULLIF compares twp expressions and returns null if they are equal, or the first expression if they are not equal.
[多项选择]Which two statements correctly identify considerations to take into account when deciding on Campus QoS Design elements?()
A. Voice needs to be assigned to the hardware priority queue.
B. Voice needs to be assigned to the software priority queue.
C. Call signaling must have guaranteed bandwidth service.
D. Strict-priority queuing should be limited to 50 percent of the capacity of the link.
E. At least 33 percent of the link bandwidth should be reserved for default best-effort class.
[多项选择]Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?()
A. Troubleshooting is more complicated.
B. Service and switch modules are underutilized.
C. Layer 2 adjacency is required with the servers that use this design.
D. Layer 3 adjacency is required with the servers that use this design.
E. Load balancing will always occur across both access layer uplinks.
[多项选择]Which of the following statements correctly describes the characteristics of a Frame Relay point-to-point subinterface?()
A. Needs to use Inverse ARP.
B. Maps a single IP subnet per DLCI.
C. Maps a single IP subnet across multiple DLCIs.
D. Resolves NBMA (non broadcast multi access) split horizon issues.
E. Requires use of the frame-relay map command.
F. None of the above
[多项选择]Which three statements correctly describe the features of the I/O calibration process?()
A. Only one I/O calibration process can run at a time
B. It automates the resource allocation for the Automated Maintenance Tasks
C. It improves the performance of the performance-critical sessions while running
D. It can be used to estimate the maximum number of I/Os and maximum latency time for the system
E. The latency time is computed only when the TIMED_STATISTICS initialization parameter is set to TRUE
[多项选择]Which two statements about login classes correctly define their usage within the JUNOS software?()
A. A different login class must be configured for each user.
B. Individual commands can be explicitly allowed or denied.
C. A user must be assigned to one of the default login classes.
D. Each login class is associated with one or more permissions flags.
[多项选择]Which three of the protocols below belong to the application layer?()
A. ARP
B. HTTPS
C. SMTP
D. CDP
E. TFTP
F. ICMP
[多项选择]Which two statements correctly describe the relation between a data file and the logical databasestructures()
A. An extent cannot spread across data files.
B. A segment cannot spread across data files.
C. A data file can belong to only one tablespace.
D. A data file can have only one segment created in it.
E. A data block can spread across multiple data files as it can consist of multiple operating system (OS) blocks.