If the database link is created with ____ authentication, the user account must exist in the remote database only.

A. connect to user
B. current user
C. remote user
D. local user


Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. Through the use of set and get member functions, you can validate attempted modifications to private data and control how that data is presented to the caller. b. A client of a class is any other code that calls the class’s member functions. c. Any client code can see a private data member and do whatever it wants with it, including setting it to an invalid value. d. Tightly controlling the access to and presentation of private data can greatly reduce errors, while increasing the usability, robustness and security of your programs.

Computer Science & Information Technology

List nodes normally are not necessarily stored in contiguous memory. Rather, they’re ________ contiguous.

a. physically b. approximately c. comparably d. logically

Computer Science & Information Technology

When a program uses an if statement to execute a block of statements only when a condition is true, then that program is using ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Lynn runs the locate command and the results include many files from a directory that she doesn’t want to include in her search. Which of the following files could Lynn modify so that the locate command no longer includes those results?

A. /etc/locate.d/updatedb.conf B. /etc/locate.conf C. /etc/updatedb.conf D. /etc/locatedb.conf

Computer Science & Information Technology