位置:首页 > 题库频道 > 其它分类 > 计算机其它 > 专业技术初级资格程序员基础知识DB2

Which privilege is required to invoke a user defined function、

发布时间:2024-07-09

A.CALL

B.USAGE

C.EXECUTE

D.REFERENCES

试卷相关题目

  • 1A new user named USER1 needs to retrieve information from a database named MYDB. Whatauthority must be granted to user USER1、

    A.DBCTRL authority

    B.SQLADM authority

    C.DATAACCESS authority

    D.ACCESSCTRL authority

    开始考试点击查看答案
  • 2Which SQL statement will allow user USER1 to create a view on a table named EMPLOYEE、

    A.GRANT CREATETAB ON DATABASE TO user1

    B.GRANT SELECT ON TABLE employee TO user1

    C.GRANT CREATEVIEW ON DATABASE TO user1

    D.GRANT REFERENCES ON TABLE employee TO user1

    开始考试点击查看答案
  • 3A table named EMPLOYEE was created as follows:  CREATE TABLE employee  (emp_id INTEGER NOT NULL PRIMARY KEY,   f_name VARCHAR(30),   l_name VARCHAR(40),   ssn    CHAR(9) NOT NULL) Which action will prevent unauthorized users from accessing SSN data、

    A.Assign the SSN column to a restricted role that only authorized users can access.

    B.Only grant ACCESSCTRL authority for the SSN column to users who need to access SSN data.

    C.Alter the table definition so that SSN data is stored in a separate schema that only authorized users can access.

    D.Create a view for the EMPLOYEE table that does not contain the SSN column and requireunauthorized users to use the view.

    开始考试点击查看答案
  • 4User USER1 holds both DBADM and SECADM authority and you want to separate databaseadministration activities from security administration tasks. What authority must you have in order to revoke SECADM authority from user USER1 and assign it to someone else、

    A.DBADM

    B.DBCTRL

    C.SECADM

    D.DBMAINT

    开始考试点击查看答案
  • 5A column mask that is to be used for row and column access control (RCAC) was created with the DISABLE option specified. What must be done if this mask is to be used to restrict access to data storedin a table named EMPLOYEE、

    A.The column mask must be enabled; the EMPLOYEE table must be altered to activate column access control.

    B.The column mask must be enabled (column access control for the EMPLOYEE table will be activated automatically).

    C.The EMPLOYEE table must be altered to activate column access control (the column mask will be enabled automatically).

    D.The EMPLOYEE table must be altered to activate column access control; row permission must be granted to everyone who needs to use thecolumn mask.

    开始考试点击查看答案
  • 6Which statement is true about an index that is used to support a UNIQUE constraint、

    A.It must not contain more than one column.

    B.It cannot be used in a referential constraint.

    C.It must be defined with the UNIQUE attribute.

    D.It must be defined as UNIQUE WHERE NOT NULL.

    开始考试点击查看答案
  • 7Which statement regarding triggers is true、

    A.Only one INSERT, UPDATE, or DELETE trigger can be defined per table.

    B.Triggers cannot be modified, they must be dropped and recreated with new definitions.

    C.Adding a trigger to a table that already has rows in it will cause triggered actions to be fire

    D.D. Triggers can only be fired one time per statement irrespective of the number of rows affected.

    开始考试点击查看答案
  • 8A table named STATES was created as follows:  CREATE TABLE states  (state_cd     CHAR(2) NOT NULL,   state_desc   CHAR(20)); CREATE UNIQUE INDEX indx1 ON states (state_cd); What will happen、

    A.An error will be returned and the operation will fail.

    B.A warning will be returned and the unique index INDX1 will become the index for the primary key.

    C.The primary key will be successfully added and the unique index INDX1 will be dropped and recreatedas the primary key index.

    D.The primary key will be successfully added, the unique index INDX1 will be dropped, and a new indexwill be created for the primary key.

    开始考试点击查看答案
  • 9When an application using a temporary table terminates or disconnects from the databaseunexpectedly, what happens to the temporary table and any data stored in it、

    A.The data in the table is deleted and the table persists.

    B.The data in the table is deleted and the table is implicitly dropped.

    C.The temporary table is converted to a base table and the data is delete

    D.D. The temporary table is converted to a base table and the data is persistent.

    开始考试点击查看答案
  • 10When a user-defined function (UDF) is created and no schema is specified, what schema is used to store the UDF、

    A.The SYSIBM schema.

    B.The SYSFUN schema.

    C.A schema with the name of the UDF.

    D.A schema with the userid of the UDF definer.

    开始考试点击查看答案
返回顶部