Which two statements are true about the primary key constrai

题目
多选题
Which two statements are true about the primary key constraint in a table? ()
A

It is not possible to disable the primary key constraint.

B

It is possible to have more than one primary key constraint in a single table.

C

The primary key constraint can be referred by only one foreign key constraint.

D

The primary key constraint can be imposed by combining more than one column.

E

The non-deferrable primary key constraint creates an unique index on the primary key column if it is not already indexed.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Examine the following commands for redefining a table with Virtual Private Database (VPD) policies:Which two statements are true about redefining the table?()

A. All the triggers for the table are disabled without changing any of the column names or column types in the table.

B. The primary key constraint on the EMPLOYEES table is disabled during redefinition.

C. VPD policies are copied from the original table to the new table during online redefinition.

D. You must copy the VPD policies manually from the original table to the new table during online redefinition.


参考答案:B, C

第2题:

Which of following statements about testing software with data is (are) true?

Ⅰ.The primary purpose of such testing is to find errors.

Ⅱ.Such testing can demonstrate the existence of errors but can not demonstrate the absence of errors.

A.Neither

B.Ⅰ only

C.Ⅱ only

D.Ⅰ and Ⅱ


正确答案:B

第3题:

Which of the following statements about testing software with data is (are) true?

Ⅰ.The primary purpose of such testing is to find errors.

Ⅱ.Such testing can demonstrate the existence of errors but cannot demonstrate the absence of errors.

A.Neither

B.I only

C.Ⅱonly

D.Ⅰand Ⅱ


正确答案:B

第4题:

Which two statements are true about the primary address on an interface?()

  • A、It is the address used by default as the local address for broadcast and multicast packets sourced locally and sent out of the interface
  • B、You use the primary address when you have multiple IP addresses belonging to the same subnet on the same interface
  • C、It can be useful for selecting the local address used for packets sent out of unnumbered interfaces when multiple non-127 addresses are configured on the loopback interface
  • D、By default, the primary address on an interface is selected as the numerically highest local address configured on the interface

正确答案:A,C

第5题:

Which of the following statements is TRUE about the primary system dump device?()

  • A、 It is shared. 
  • B、 It must be /dev/hd6. 
  • C、 It must be an internal disk. 
  • D、 It can be an external device.

正确答案:D

第6题:

Which two statements regarding symmetric key encryption are true?() (Choose two.)

A. The same key is used for encryption and decryption.

B. It is commonly used to create digital certificate signatures.

C. It uses two keys: one for encryption and a different key for decryption.

D. An attacker can decrypt data if the attacker captures the key used for encryption.


参考答案:A, D

第7题:

Which two statements about NTP version 4 are true?()

  • A、It supports fast synchronization at starting and before network failures
  • B、It supports automatic server discovery
  • C、It uses a fixed-point arithmetion
  • D、It supports the "nanokernel" kernel implementation
  • E、It does not support Public-Key Cryptography

正确答案:B,D

第8题:

The InnoDB engine has a feature known as clustered indexes.Which three statements are true about clustered indexes as used in InnoDB?()

A.A primary key must exist for creation of a clustered index

B.A clustered index allows fulltext searching within InnoDB

C.The first unique index is always used as a clustered index and not a primary key

D.A clustered index provides direct access to a page containing row data

E.If no indexes exist, a hidden clustered index is generated based on row IDs

F.A primary key is used as a clustered index

G.A clustered index is a grouping of indexes from different tables into a global index for faster searching


参考答案:D, E, F

第9题:

Which two statements are true about L2TP tunnels?() (Choose two.)

  • A、Traffic is clear text
  • B、Traffic is encrypted 
  • C、They are initiated by the LNS
  • D、They are initiated by the LAC

正确答案:A,D

第10题:

Which two statements regarding asymmetric key encryption are true?()

  • A、The same key is used for encryption and decryption.
  • B、It is commonly used to create digital certificate signatures.
  • C、It uses two keys: one for encryption and a different key for decryption.
  • D、An attacker can decrypt data if the attacker captures the key used for encryption

正确答案:A,B

更多相关问题