星期四, 9月 30, 2010

體能活動的健康益處

任何年齡的人士要促進健康,其中一種最好的方法就是多做運動。

兒童及青少年


科學證據的強度健康益處
非常有力
  • 改善心肺耐力及肌力
  • 較理想的身體成分(脂肪百分比)
  • 改善骨骼健康
  • 改善心血管及新陳代謝健康的生物性指標
中等強度
  • 減少焦慮及抑鬱徵狀

成年人及長者


科學證據的強度健康益處
非常有力
  • 降低早逝的風險
  • 降低患上心臟病的風險
  • 降低中風的風險
  • 降低患上二型糖尿病的風險
  • 降低患上高血壓的風險
  • 降低出現不理想血脂譜的風險
  • 降低患上代謝綜合症的風險
  • 降低患上結腸癌的風險
  • 降低患上乳癌的風險(女性)
  • 預防體重上升或促進體重減輕(須配合適當的飲食)
  • 改善心肺功能及肌力
  • 預防跌倒
  • 減低抑鬱情緒
  • 較佳的認知能力(長者)
中等強度至非常有力
  • 較佳的身體功能(長者)
  • 減少中央肥胖
中等強度
  • 在減重後維持體重
  • 降低髖骨骨折的風險
  • 增加骨質密度
  • 改善睡眠質素
  • 降低患上肺癌的風險
  • 降低患上子宮內膜癌的風險(女性)

星期三, 9月 29, 2010

batch file script - check folder / file size

@echo off

fc c:\ABC\abc.txt
c:\DEF\abc.txt > nul
if errorlevel 2 goto err2
if errorlevel 1 goto err1
if errorlevel 0 goto err0

goto exit

:err0
echo. is same
goto exit

:err1
echo. is different
goto exit

:err2
echo. file is lost
goto exit

:exit

-----------------

rem:
//這段編碼是用來比較檔案或資料夾的大小是否相同。


@echo off 
rem://
關閉指令行自身的顯示

fc c:\ABC\abc.txt
c:\DEF\abc.txt > nul
rem:// fc.exe 是用來比較兩個檔案或兩組檔案並且顯示其中的不同之處。(一般在 c:\windows\system32\)
rem:// 如要比較兩個資料夾,可以變為:( fc c:\ABC\*.* c:\DEF\*.* > nul )
rem:// 如路徑有空格,應變為:( fc "c:\AB C\*.*" "c:\DE F\*.*" > nul )
rem:// 假若不加 >nul ,cpu會飆到100。>nul 用於屏蔽標準輸出在屏幕上的顯示。

if errorlevel 2 goto err2
rem://表示兩個檔案中,有一個以上是不存在
if errorlevel 1 goto err1

rem:
//表示兩個檔案不同
if errorlevel 0 goto err0
rem://表示兩個檔案相同

goto exit
rem://以上皆不是時直接跳到「:exit」行

:err0
rem://兩個檔案相同時執行此行
echo. They are same
goto exit

rem://直接跳到「:exit」行

:err1
echo.
They are different
goto exit

:err2
echo. Some file(s) is lost
goto exit

:exit

rem://完結


星期二, 9月 28, 2010

Security responsibilities and responses: A user's view

1. Which of the following actions would help users to keep information safe?

Choose more than one option.

Keep important information stored separately in hard copy form
Have a strong password
Be careful about leaving your computer unattended
Report anything suspicious



2. Which of the following should be part of the effort to reduce the level of threat to security posed by an organization's own employees?

Choose more than one option.

Keep employees motivated
Ensure that employees' skills are updated on an ongoing basis
Monitor employee activity
Install appropriate technical barriers



3. Which of the following are key considerations for an information security program?

Choose more than one option.

Confidentiality
Availability
Communication
Integrity



4. Which of the following are criteria for a good password?

Choose more than one option.

It is almost impossible for others to guess
It has personal significance
You don't have to write it down
It evokes a pleasant, thus memorable, image



Topic title: Security responsibilities and responses: A user's view


Which of the following are considered potential security threats?

Computer viruses
Internet privilege
Loss of data
Unauthorized access

星期一, 9月 27, 2010

Introduction to security policies

1. Security ___________ define which of a company's resources are to be protected, whereas security _________ define how to protect them.

To fill the first blank, select one of the options below. The other option will automatically appear in the second blank.

procedures
policies



Security policies define which of a company's resources are to be protected, whereas security procedures define how to protect them.




2. Which of the following should be the first step in developing a security policy?

Choose an option.

Assigning risk factors
Prioritizing resources
Classifying resources
Defining acceptable and unacceptable activities



3. Which of the following statements best describes a company's information protection policy?

Choose an option.

It defines methods of remotely connecting to the main network
It provides guidelines on how users should process, store, and transmit sensitive information
It provides guidelines for reporting and managing virus infections
It defines the appropriate use of computing resources

星期日, 9月 26, 2010

Identifying Internet security measures

1. Which of the following involves users submitting their usernames and passwords in encrypted form?

Choose an option.

Anonymous access
Basic authentication
Secure authentication
Digital certificates


2. You use your ________ to decrypt messages you receive.

You send your _________ to the people from whom you expect to receive an encrypted message.

To fill the first blank, select one of the options below. The other option will automatically appear in the second blank.

private key
public key


You use your private key to decrypt messages you receive.

You send your public key to the people from whom you expect to receive an encrypted message.


3. A digital certificate contains which of the following?

Choose more than one option.

A certificate serial number
A certificate expiration date
Your private key
The certificate authority's digital signature

星期六, 9月 25, 2010

Threats to data on networked computers

1. A _________ is a simple destructive miniature program that infiltrates its way into computer systems.

Choose an option below to fill in the blank.

VPN
hacker
IP address
virus



2. Which of the following statements regarding hackers are true?

Choose more than one option.

They always gain access to system resources from outside
They use Internet message boards to gain information on system security holes
They impersonate authorized users to gain access to systems
They all aim to defraud the companies whose systems they penetrate



3. What do ethical hackers do?

Choose an option.

Try to break into systems so as to defraud companies
Test a system's security to see where malicious hackers could gain access
Create antivirus software
Impersonate authorized users using a spoof IP address in order to breach system security

星期五, 9月 24, 2010

Threats and security risks on the Web

1. Which web browser setting controls how a web browser receives information that is automatically saved to your hard disk?

Cookies
Security
Proxy
Mail server


2. A macro virus will typically affect the file currently open on your computer.

A boot-sector virus infects a portion of your hard disk.

To fill the first blank, select one of the options below. The other option will automatically appear in the second blank.

macro
boot-sector


3. Which of the following terms describes information about a user that is stored on a client machine by a web browser?

Choose an option.

A cookie
A cache
A MIME
A certificate


4. Why is it important to frequently update the virus definition files on your virus protection software?

Choose an option.

To prevent hacking attempts
To keep abreast of the newest viruses
To prevent viruses from infecting your CD-ROMs
To automatically patch your word-processing software

星期四, 9月 23, 2010

Introduction to network security threats

1. Which of the following definitions refers to data becoming corrupt due to incorrect inputting procedures?

Choose an option.

Malicious threat
Inappropriate activity
Nuisance threat
Accidental loss

2. Which of the following terms describes the event whereby a hacker installs a virus on your computer and then tries to make you inadvertently activate it?

Choose an option.

Denial of Service (DoS)
Trojan horse
Packet sniffing
E-mail spoofing

3. Which of the following should be disabled in order to discern whether a file is a virus?

Choose an option.

Hide file extensions for known file types in Windows
Java, JavaScript, and Active X in browsers
Denial of Service (DoS)
Chat sites

星期三, 9月 22, 2010

Network security components

1. In symmetrical encryption, a private key is used, whereas in asymmetrical encryption, both public and private keys are used.

To fill the first blank, select one of the options below. The other option will automatically appear in the second blank.

asymmetrical
symmetrical


2. Which of the following steps can be implemented to prevent virus attacks?

Choose more than one option.

Prevent unauthorized users accessing the Internet
Use access control
Use software packages to immunize your system
Use virus scanners to search for viruses each time you boot up



3. Which of the following is a collection of components that acts as a barrier between a private network and the outside world?

Choose an option.

Encrypted tunnel
Firewall
Virtual Private Network (VPN)
Virus


4. When you receive a message encrypted by the sender's private key, you decrypt it using the sender's public key.

Choose an option below to fill in the blank.

private
public



5. IDS systems work by calculating baselines for each of the parameters monitored. Your system is said to be operating normally when the parameter values recorded are within the baselines.

Choose an option below to fill in the blank.

outside
within



6. Which of the following are common user authentication systems?

Choose more than one option.

Biometrics
Digital signatures
Passwords
Personal tokens

星期二, 9月 21, 2010

Overview of the Internet

1. Which of the following is a valid IP address?

Choose an option.

204.115
204.115.34
204.115.34.10
204.115.34.10.102


2. Which protocol is used by computers on the Internet to communicate with each other?

Choose an option.

IPX/SPX
NetBEUI
TCP/IP
DECNet



3. The SMTP protocol is used for which of the following?

Sending e-mail messages between mail servers
Transferring outgoing e-mail messages from a client to a server
Exchanging newsgroup messages
Transferring incoming e-mail messages from a mail server to a mail client



4. What is the correct URL syntax for a company called Imagenie?

http://www.imagenie.com
http//www.imagenie.com
imagenie@www.http.com
www/imagenie/com


5. __________ is the protocol used between a web server and a web browser when web pages are downloaded during a web browsing session.

Choose an option below to fill in the blank.

HTML
HTTP
FTP
Telnet


6. Let's say that you need to establish a web site that your employees can use to see human resources information and internal documents.

Which type of site should you create to do this?

Choose an option.

An Internet site
An intranet
An extranet
A virtual private network



7. Which of the following must you have to access an extranet?

Choose more than one option.

The correct URL
A valid username
A password
A digital certificate


8. are networks that are partially accessible to authorized outsiders.

Choose an option below to fill in the blank.

Internets
Extranets
Intranets



9. Which TCP/IP protocol is used for sending and receiving newsgroup messages?

FTP
HTTP
LDAP
NNTP

星期三, 9月 15, 2010

Before I tell you the factors that lead unhappy marriage

Before I tell you the factors that lead unhappy marriage, let me show you the trend of divorce rate. In this table, you can see that the number of divorce decrees is getting higher and higher. In 2006, there are about 17 thousands of couples getting divorce. But why do they have unhappy marriage even end in divorce?
Firstly, some couples may get married because of premarital pregnancy. In this situation, we can see that the partners have fatuous love. Although the partners have passion to share sex and have a commitment to take care of their baby, they may have not yet develop other aspects of true intimacy and may lack a real understanding of who they are marrying. It has many problems that leading they have an unhappy marriage.
Here is an example of it. Ada and Ken get married because of premarital pregnancy. But they need to face lots of problems such as mentally and financial problems. And Ada have bad relationship with Ken’s mother but Ken doesn’t help Ada to solve the problem. Finally, Ada regrets to get marry and have the baby.
Next is poor communication, mother Teresa said “if youjudge people, you have no time to love them. Couples may have do so that lead unhappiness. The reasons are couples may busy in work, so they do not pay attention to or concern with their spouse or even have conflicts with their spouse such as household task. They will complain their spouse, for instance, "He never listens to me when I talk!"
"She talks and talks, but never actually says anything!"
Another factor is the partners get married too fast. They have infatuated love because they only have passion to get married. They do not have deeply understanding to each other.

星期二, 9月 14, 2010

Installation of Lotus Notes R5 Guide (Lotus client 5.0.11)

Installation from CD-ROM is preferred and the following steps can be followed.
Wait for Auto Run of the Lotus installation program start.
On the screen “Please select from the following options”, choose “Install”.



On the screen, Click “Clients….”.


On the next screen, choose “Lotus Notes”.


Click “Standard install”.


Select “Next”.





Click “yes” to confirm.

Input the Name field and the company field.


Click “Next” to confirm install on default directory.


 Click “Next”.

Click “Finish” to complete.

The following steps can be followed to configure the Lotus Notes Client.
Running Lotus Notes is started by clicking “Start” -> “Program” -> “Lotus Applications” -> “Lotus Notes”.
On the screen “Setting up connections”, click “Next”.



Select “I want to connect to a Domino server.”.
 Choose “Set up a connection to a local area network (LAN)”.

Input the mail server name into Domino server name field. (for example: madh02n)



Click “Browse” button to select the user ID.




A message is prompted for copying the ID file to the data directory (default directory : c:\lotus\notes\data), click “Yes”.
 Enter password for that user ID.


On the screen, Choose “I don’t want to create an Internet mail account.”
 On the screen, Choose “I don’t want to connect to a news server.”

On the screen, Choose “I don’t want to connect to another directory server.”
 On the screen, Select “I do not connect to the Internet through a proxy server.”

On the screen, Choose “Connect over local area network (or cable modem).”
 Click “Finish”.

On the screen, Lotus Notes default use welcome page.

Click “database” icon on bookmark bar. Select “Workspace” and then right click mouse button should be show popup menu. Choice “Set bookmark as Home page.”

Click “Yes” to confirm, and then the installation should be finished.

星期一, 9月 13, 2010

使用 Lotus Notes 標記郵件為已讀取 / 未讀取 (read / unread) ?

在 inbox 中選擇該郵件之後,只需單按鍵盤上的「insert」鍵便可。同時該郵件的顏色亦會轉變。


紅色:未讀郵件
黑色:已讀郵件

星期日, 9月 12, 2010

Adobe flash player 安裝失敗

問:自從安裝 flash player 一次不成功後,便未曾成功安裝,同時不能移除舊有的 flash player,該如何做?


答:

1. 安裝 subinacl.msi
http://download.microsoft.com/download/1/7/d/17d82b72-bc6a-4dc8-bfaa-98b37b22b367/subinacl.msi
 

2.安裝 reset_minimal
http://www.adobe.com/support/flashplayer/ts/documents/fb1634cb/reset_minimal.zip

解壓縮後,將reset_minimal複製到 C:\Program Files\Windows Resource Kits\Tools\ 目錄下(即預設目錄)


3.下載 flash player 卸載器
http://download.macromedia.com/pub/flashplayer/current/uninstall_flash_player.exe



4. 重新安裝 flash player ,okay~

星期六, 9月 11, 2010

手機的上網數據流量

手機上網 MB 數流量產生原因
  1. 手機軟體自動更新
  2. 普通的上網
  3. 聊天
  4. 收發郵件
  5. 看視頻及電影

手機瀏覽網頁的MB數計法
  • 一般來說如果網頁没有自動 refresh 的功能,便只會在開啟該網頁時會產生流量。
  • 假若網頁有 3个 <img></img> 標籤,即使連接的是同一張圖片,實際上訪問這個頁面時該圖會被下載五次。

星期五, 9月 10, 2010

Q: 當使用 Office 來列印文件時,除了原先要列印的文件外, Office 會自動列印出一張文件資訊頁。為何會自動列印多了一頁?

例如:
===========================


檔名: xxxx.doc
目錄:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\.....
範本:C:\Documents and Settings\Administrator\Application Data\Microsoft\Templates\Normal.dot
標題:XXX
主旨:
作者:wfh0804
關鍵字:hot news
註解:
建檔日期:d/m/yyyy h:mm
修訂版編號:1
前次更新日期:d/m/yyyy h:mm
前次存檔人員:wfh0804
編修總時間:15分鐘
最後列印在:d/m/yyyy h:mm
最後列印的字數
  頁數:x
  字數:x(約)
  字元數:x(約)

===========================


A: 這是因為閣下在 Ms Office 設定了「附帶印出摘要資訊」。

步驟一: 在任何應用軟體中(如 Microsoft Word) 按下「列印」=> 「選項」



步驟二 : 取消選擇「摘要資訊」即可


p.s. 如果打印文件時未能正常顯示頁碼,只能打印 {PAGE},可嘗試剔除「功能變數代碼」。

星期三, 9月 08, 2010

Lotus Notes 的 Home Page 不是 Workspace 板面

新安裝 Lotus Notes 時,預設開啟時不是 Workspace 頁面的。
如果希望下次 execute LN 時 default 跳至 Workspace,設定如下:

     鼠標移到 Databases -> 單擊左鍵
-> 鼠標移到 Workspace -> 單擊右鍵
-> 鼠標移到 Set Bookamrk as Home Page -> 單擊左鍵



星期二, 9月 07, 2010

Access Point of HKIT CSW Campus

香港科技專上書院九龍校舍無線接入點
WIFI information of HONG KONG INSTITUTE OF TECHNOLOGY



地點: 九龍長沙灣長沙灣道638號



SSID: HKIT-CSW
KEY: wireless4hkit


Country: HONG KONG
Region: HONG KONG (SAR)
City: HONG KONG
Latitude: 22.24786
Longitude: 114.203384
Time Zone: +08:00
Net Speed: DSL
ISP: PACNET
Domain: CITA.COM.HK
IDD Code: 852


無線區域網路介面卡 Wireless:

連線特定 DNS 尾碼 . . . . . . . . : hkit.edu.hk
DHCP 已啟用 . . . . . . . . . . . : 是
自動設定啟用 . . . . . . . . . . .: 是
子網路遮罩 . . . . . . . . . . . .: 255.255.255.0
預設閘道 . . . . . . . . . . . . .: 192.168.2.5
DHCP 伺服器 . . . . . . . . . . . : 192.168.2.5
DNS 伺服器 . . . . . . . . . . . .: 192.168.2.5
NetBIOS over Tcpip . . . . . . . .: 啟用



IPcop 1.4.21
Configuration page:
http://cswgateway.hkit.edu.hk:81/
https://192.168.2.5:445/cgi-bin/index.cgi

星期一, 9月 06, 2010

The DB2 database creation process

1. What can you conclude about a database that is physically stored in the path segment \BROCDB\NODE0000\SQL00004\?

It is the fourth database created within this path
The database is not partitioned
The instance name is BROC
The tablespaces are SMS


2. Suppose you've created a nonpartitioned database on the E drive called BROCDB. What will the path name be?

Local Disk (E:)/BROCDB/NODE0000
Local Disk (E:)/BROCDB/NODE0001
Local Disk (E:)/NODE0000/BROCDB
Local Disk (E:)/NODE0001/BROCDB




3. You are in the process of creating a database, and the database configuration file has just been initialized. Which tasks will complete the creation of the database?

Binding certain utility programs to the database
Cataloging the database
Creating system tablespaces
Granting authorities and privileges to the appropriate users




4. Which database recovery file stores information about the buffer pool?

SQLBP.1
SQLDBCON
SQLINSLK
SQLSPCS.1




5. What is the function of SYSCATSPACE1?

To provide temporary storage for reorganizing tables
To store system views and catalog tables
To store user-defined objects




6. You're creating a database, and the buffer pool has just been created. Which of these tasks have been completed at this stage of the process?

All the files needed for database recovery have been created
Authorities and privileges have been granted to the appropriate users
Four default schemas have been created
The database has been cataloged in the system and local database directory

星期日, 9月 05, 2010

Tablespaces in DB2 UDB databases

1. Suppose you want to create a very large temporary tablespace that will store the global temporary tables where the application data is stored for brief periods of time. Which type of tablespace should you create?

Large
Regular
System temporary
User temporary



2. During the execution of certain operations, internal application-specific data is generated, along with declared global temporary tables. You want to create a tablespace to store this data. Which tablespace should you choose?

Large
Regular
Temporary



3. Suppose you want to create a tablespace where the storage space needs to be set at a certain size, and where additional containers can be added as required. Which type of tablespace should you create?

DMS
SMS
Temporary




4. What allocates storage space in an SMS tablespace?

DB2 Database Manager
Domain Controller
File manager of the operating system
Group Policy




5. What does a tablespace hold?

Boot records
Data
Pointers to data
Registry settings





6. What can a regular tablespace contain?

Declared global temporary tables
Index data
Long field data
Regular data

星期六, 9月 04, 2010

Working with SMS and DMS tablespaces in DB2

1. Suppose you want to obtain basic information about the containers that are associated with the BRODB database, which has an internal ID of 1. Which command should you execute to obtain the results?

LIST TABLESPACE
LIST TABLESPACE CONTAINERS FOR 1
LIST TABLESPACE CONTAINERS FOR BRODB
LIST TABLESPACE SHOW DETAIL



2. Which of the following commands will add the file STG.TSF, located on the root of C, which is 1000 MB in size, as a storage file to the tablespace MYTABLESPACE?

ALTER TABLESPACE MYTABLESPACE ADD (FILE 'C:\STG.TSF', 1000)
ALTER TABLESPACE MYTABLESPACE ADD (FILE 'C:\STG.TSF', 1000 M)
ALTER TABLESPACE MYTABLESPACE DROP (FILE 'C:\STG.TSF')
ALTER TABLESPACE MYTABLESPACE EXTEND (FILE 'C:\STG.TSF' 1000 M)




3. What type of tablespace will be created by this statement?
CREATE REGULAR TABLESPACE TEMPSTAFF
PAGESIZE 8K
MANAGED BY DATABASE USING

A large SMS tablespace
A regular DMS tablespace
A system temporary tablespace
A user temporary tablespace



4. Which of the following parameters are common to both DMS and SMS tablespace commands?

The name of the buffer pool used by the tablespace
The name that will be assigned to the tablespace
The number of pages to be stored in the tablespace container
The size of each space used by the tablespace







5. What parameters of an SMS tablespace can you modify?

Buffer pool associated with a tablespace
Container size
Prefetch pages
Prefetch size





6. What type of information is returned by executing the LIST TABLESPACE command?

The current state of the tablespace
The internal ID of the tablespace
The name of the tablespace
The number of empty pages

星期五, 9月 03, 2010

Buffer pools in DB2 UDB

1. When you configure a buffer pool from the Control Center, what must you do to configure the Create Buffer Pool dialog box so that the buffer pool is only created when all connections to the database are closed?

Configure the dialog box to create the buffer pool immediately
Configure the dialog box to create the buffer pool when the database restarts
Configure the dialog box to store pages in extended memory



2. Suppose you want to change the page size of a buffer pool called CLIENT_BP to 550. Which command do you execute to change the page size of the buffer pool?

ALTER BUFFERPOOL CLIENT_BP 550;
ALTER BUFFERPOOL CLIENT_BP PAGESIZE 550;
ALTER BUFFERPOOL CLIENT_BP SIZE 550;




3. Suppose you want to create a buffer pool - SALES_BP - that contains 350 pages and services tablespaces that use a page size of 8192 bytes.
Which code do you need to execute to create this buffer pool?

CREATE BUFFERPOOL SALES_BP SIZE 8 PAGESIZE 350K;
CREATE BUFFERPOOL SALES_BP SIZE 350 PAGESIZE 8192K;
CREATE BUFFERPOOL SALES_BP SIZE 350 PAGESIZE 8K;
CREATE BUFFERPOOL SALES_BP SIZE 8192 PAGESIZE 350K;




4. What is the function of the buffer pool?

Cache data pages
Free up memory space
Improve database system performance
Write dirty pages to the hard drive

星期四, 9月 02, 2010

Tables in DB2 UDB

1. Suppose you want to create a table using the Create Table Wizard. Which DB2 tool do you need to use to access the wizard?

Command Center
Control Center
Development Center
Task Center



2. Suppose you want to create a table with the CREATE TABLE command and you want to include a column definition. Which parameter of the command do you need to replace with the column definition?

ColumnName
Element
TablespaceName
UniqueConstraint



3. Which DB2 table type temporarily stores data used by an application?

Base
Declared temporary
Result
Typed




4. Suppose you want to create the table - EMPLOYEES - with these columns: EMP_NAME with a character data type 50 characters long, EMP_ID with an integer data type, and EMP_SALARY with a decimal data type with a precision of 5 and a scale of 2. Data must be entered into each column. Which code do you need to execute to create this table?

CREATE TABLE EMPLOYEES (EMP_ID INTEGER, EMP_NAME CHAR(50), EMP_SALARY DECIMAL (5,2));
CREATE TABLE EMPLOYEES (EMP_ID INTEGER NOT NULL, EMP_NAME CHARACTER(5,2), EMP_SALARY DECIMAL (50) NOT NULL);
CREATE TABLE EMPLOYEES (EMP_ID INTEGER NOT NULL, EMP_NAME CHAR(50) NOT NULL, EMP_SALARY DECIMAL (5,2) NOT NULL);

星期三, 9月 01, 2010

Creating DB2 databases using wizard and command options

Q1. You want to create a database called NEWBRO using the CREATE DATABASE command.
Which command statement will create this database providing the minimum of information?

CREATE DATABASE ;
CREATE DATABASE NEWBRO;
CREATE DATABASE NEWBRO ON E:;
CREATE DATABASE NEWBRO CATALOG TABLESPACE MANAGED BY SYSTEM;




Q2. From where can you launch the Create Database Wizard?

Command Center
Control Center
Journal
Task Center




Q3. What does the following command do?
CREATE DATABASE STOCK CATALOG TABLESPACE MANAGED BY DATABASE EXTENTSIZE 16 PREFETCHSIZE 16

Creates a new table called STOCK
Creates a new DMS database called STOCK
Creates a new SMS database called STOCK






Q4. What can you do with the Create Database Wizard?

Adjust the performance of the database
Rename a database that already exists
Review the command that will be executed by the wizard
Specify where to store catalog tables

推薦此文