Which two are true about aggregate functions?()

A . You can use aggregate functions in any clause of a SELECT statement. B . You can use aggregate functions only in the column list of the SELECT clause and in the WHERE clause of a SELECT statement. C . You can mix single row columns with aggregate functions in the column list of a SELECT statement by grouping on the single row columns. D . You can pass column names, expressions, constants, or functions as parameters to an aggregate function. E . You can use aggregate functions on a table, only by grouping the whole table as one single group. F . You cannot group the rows of a table by more than one column while using aggregate functions.

时间:2022-10-30 04:31:16 所属题库:1Z0-007题库

相似题目

  • Which two are true about authentication?()

    A . Form-based logins should NOT be used with HTTPS. B . When using Basic Authentication the target server is NOT authenticated. C . J2EE compliant web containers are NOT required to support the HTTPS protocol. D . Web containers are required to support unauthenticated access to unprotected web resources.

  • Which two statements are true about using the isUserInRole method to implement security in a Java EEapplication?()

    A . It can be invoked only from the doGet or doPost methods. B . It can be used independently of the getRemoteUser method. C . Can return "true" even when its argument is NOT defined as a valid role name in the deployment descriptor. D . Using the isUserInRole method overrides any declarative authentication related to the method in which it is invoked.

  • Which two statements are true about the digital audio in a VoIP network? ()

    A .  Standard encoding techniques create an uncompressed digital data rate of 4000 bps. B .  Standard encoding techniques create an uncompressed digital data rate of 8000 bps. C .  Standard encoding techniques create an uncompressed digital data rate of 64,000 bps. D .  Voice quality is not a concern if compression is not used. E .  Two methods of quantization are linear and logarithmic. F .  Two methods of compression are u-law and a-law.

  • Which two statements are true about voice ports on a router?()

    A . Calls to the PSTN can be made via the use of FXO or T1/E1 trunk ports. B . Calls to the PSTN can be made via FXS or T1/E1 trunk ports. C . Analog and IP phones can be connected to the VoIP network via FXO or T1/E1 trunk ports. D . Calls between analog phones that are attached to the FXS ports in a VoIP network can be completely processed by voice-enabled routers.

  • Which two statements about QoS options in a Cisco UCS environment are true?()

    A .  The QoS policy assigns a system class to the outgoing traffic for a vNIC or vHBA. B .  Flow-control policies determine whether the uplink Ethernet ports in a Cisco UCS environment send and receive IEEE 802.3x pause frames when the send buffer for a port fills. C .  If no system class is configured as CoS 0, the Fibre Channel system class is used. D .  The user can configure QoS for these system classes: platinum, gold, silver, best effort, Fibre Channel. E .  When configuring a system class, the type of adapter in a server may limit the maximum MTU supported.

  • Which two statements are true about setting the FAST_START_MTTR_TARGET initializationparameter to a nonzero value()

    A . The MTTR advisor will be disabled. B . Automatic checkpoint tuning will be enabled. C . The value for the LOG_CHECKPOINT_INTERVAL initialization parameter will be override the value forFAST_START_MTTR_TARGET. D . The time taken to recover the instance after the crash is always exactly the same as the value given forthe FAST_START_MTTR_TARGET initialization parameter.

  • Which two statements are true about Voice over IP (VoIP) packet delivery in a digital infrastructure? ()

    A .  Packets can arrive out of order. B .  Packets must take the same path to the destination. C .  Once packets are received at the destination router, the router performs sampling to ensure the quality of the voice traffic. D .  Packets can experience varying delays across the network. E .  Packets containing voice samples are sequentially numbered by default, allowing for reordering upon arrival at the terminal router along the path.

  • Which two statements are true about a bitmap index? ()

    A . It is recommended for the columns that have unique values. B . It can be converted to a B-tree index by using the ALTER INDEX command. C . It has a bitmap segment for each distinct value in the key column, containing a string of bits in which each bit represents the presence or absence of a key column value. D . Updating the key column locks the whole bitmap segment that contains the bit for the key value to be updated.

  • Which two statements are true about a job chain?()

    A . A job chain can contain a nested chain of jobs. B . The jobs in a job chain cannot have more than one dependency. C . A job of the CHAIN type can be run using event-based or time-based schedules. D . The jobs in a job chain can be executed only by using the events generated by the Scheduler

  • Which two statements are true about a job chain?()

    A .  A job chain can contain a nested chain of jobs B .  The jobs in a job chain cannot have more than one dependency C .  A job of the CHAIN type can be run using event-based or time-based schedules D .  The jobs in a job chain can be executed only by using the events generated by the Scheduler

  • Which two statements about using the CHAP authentication mechanism in a PPP link are true?()

    A . CHAP uses a two-way handshake B . CHAP authentication periodically occurs after link establishment C . CHAP has no protection from playback attacks D . CHAP authentication is performed only upon link establishment E . CHAP uses a three-way handshake F . CHAP authentication passwords are sent in plaintext

  • A Company is using 6to4 tunnels in their IPv6 network. Which two statements are true about thesetunnels?()

    A . In a 6to4 tunnel, the first two bytes of the IPv6 address will be 0x2002 and the next four byteswill be the hexadecimal equivalent of the IPv4 address B . In a 6to4 tunnel, the IPv4 address 192.168.99.1 would be converted to the2002:1315:4463:1::/64 IPv6 address C . In a 6to4 tunnel, the IPv4 address 192.168.99.1 would be converted to the 2002:c0a8:6301::/48IPv6 address D . In a 6to4 tunnel, the first two bytes of the IPv6 address will be locally derived and the next twobytes will be the hexadecimal equivalent of the IPv4 address E . In a 6to4 tunnel, the IPv4 address 192.168.99.1 would be converted to the 2002:c0a8:6301::/16IPv6 addre

  • Which two statements are true about the primary key constraint in a table? ()

    A . It is not possible to disable the primary key constraint. B . It is possible to have more than one primary key constraint in a single table. C . The primary key constraint can be referred by only one foreign key constraint. D . The primary key constraint can be imposed by combining more than one column. E . The non-deferrable primary key constraint creates an unique index on the primary key column if it is not already indexed.

  • Which two statements are true about the rendezvo us point (RP) in a multicast network?()

    A . The multicast sources must register with the RP to form the multicast distribution tree. B . An RP is required only in networks running Protocol Independent Multicast dense mode (PIM DM). C . The mu lticast receivers must register with the RP to form the multicast distribution tree. D . An RP is required only in networks running Protocol Independent Multicast sparse mode (PIM SM). E . An RP is required only in networks running Protocol Independent Mu lticast sparse - dense mode (PIM - SDM). F . To form the multicast distribution tree, the multicast sources register with and the receivers join the RP.

  • Which two statements about a wireless repeater topology are true?()

    A . A wireless repeater is an access point that is not connected to the wired LAN. B . The repeater feature is only available in lightweight access point topologies. C . The SSID of the root access point must be configured on the repeater access point. D . This topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater. E . This topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater. F . To avoid interference, the repeater access point must use a different channel from what the root access point uses.

  • Which two statements are true about the application of QoS in a converged network?()

    A . end-to-end network delay times that exceed 50 ms for real-time traffic are considered unacceptable B . end-to-end network delay times that exceed 250 ms for real-time traffic are considered unacceptable C . end-to-end network delay is not a factor as long as the  delay is consistent D . some packet loss can be corrected by codec algorithms E . RSVP handles voice packet retransmission F . fragmentation is a result of packet lo

  • An SVI has been configured on a device. Which two statements are true about a switched virtualinterface (SVI)?()

    A . An SVI is normally created for the default VLAN (VLAN1) to permit remote switchadministration B . Multiple SVIs can be associated with a VLAN C . SVI is another name for a routed port D . An SVI is created by entering the no switchport command in interface configuration mode E . An SVI provides a default gateway for a VLAN

  • Which two statements are true about the digital audio in a VoIP network?()

    A . Standard encoding techniques create an uncompressed digital data rate of 4000 bps. B . Standard encoding techniques create an uncompressed digital data rate of 8000 bps. C . Standard encoding techniques create an uncompressed digital data rate of 64,000 bps. D . Voice quality is not a concern if compression is not used. E . Two methods of quantization are linear and logarithmic. F . Two methods of compression are u-law and a-law.

  • Which two statements are true about using IPv4 and IPv6 simultaneously on a network segment? ()

    A . IPv6 allows a host to create its own IPv6 address that will allow it to communicate to other devices on a network configured via DHCP. IPv4 does not provide a similar capability for hosts. B . IPv6 provides for more host IP addresses but IPv4 provides for more network addresses. C . Hosts can be configured to receive both IPv4 and IPv6 addresses via DHCP. D . Host configuration options for IPv4 can be either statically assigned or assigned via DHCP.Host configuration options for IPv6 can be statically assigned only. E . IPv4 and IPv6 addresses c an be simultaneously assigned to a host but not to a router interface.

  • Which two statements about configuration an unconnected Catalyst Express 500 switch from setup mode using a PC are true?()

    A . You may use Cisco Network Assistant to set up the initial configuration B . You must use CLI for initial configuration C . You may use either CLI or CAN for configuration D . You may make a direct connection to the PC from any point on the switch E . You may only make a direct connection from the port with the flashing green LED to the PC

  • Which two statements are true about voice ports on a router? ()

    A .  Calls to the PSTN can be made via the use of FXO or T1/E1 trunk ports. B .  Calls to the PSTN can be made via FXS or T1/E1 trunk ports. C .  Analog and IP phones can be connected to the VoIP network via FXO or T1/E1 trunk ports. D .  Calls between analog phones that are attached to the FXS ports in a VoIP network can be completely processed by voice-enabled routers.

  • An SVI has been configured on a device.  Which two statements are true about a switched virtual interface (SVI)?()

    A . An SVI is normally created for the default VLAN (VLAN1) to permit remote switch administration. B . Multiple SVIs can be associated with a VLAN. C . SVI is another name for a routed port. D . An SVI is created by entering the no switchport command in interface configuration mode.  E . An SVI provides a default gateway for a VLAN.

  • Which two statements about the use of VLANs to segment a network are true?()

    A . VLANs increase the size of collision domains. B . VLANs allow logical grouping of users by function. C . VLANs simplify switch administration. D . VLANs enhance network security.

  • Which two statements are true about a Work Item with "Open" Notification? ()(Choose two.)

    A . The Work Item is not eligible for Purge. B . The Work Item is eligible for a Permanent purge. C . The Work Item is eligible for a Temporary purge. D . The Work Item is not complete because it still has "Open" Notification. E . The Work Item is eligible for both Temporary and Permanent purge.

  • Which two statements are true about a job chain? ()(Choose two.)

    A . A job chain can contain a nested chain of jobs. B . The jobs in a job chain cannot have more than one dependency. C . A job of the CHAIN type can be run using event-based or time-based schedules. D . The jobs in a job chain can be executed only by using the events generated by the Scheduler