搜题
用户您好, 请在下方输入框内搜索其它题目:
搜题
题目内容 (请给出正确答案)
提问人:网友 发布时间:
【多选题】

Which two are true about aggregate functions? ()

A、You can use aggregate functions in any clause of a SELECT statement.

B、You can use aggregate functions only in the column list of the select clause and in the WHERE clause of a SELECT statement.

C、You can mix single row columns with aggregate functions in the column list of a SELECT statement by grouping on the single row columns.

D、You can pass column names, expressions, constants, or functions as parameter to an aggregate function.

E、You can use aggregate functions on a table, only by grouping the whole table as one single group.

F、You cannot group the rows of a table by more than one column while using aggregate functions.

更多“Which two are true about aggregate functions? ()”相关的问题
第1题

AA. Traffic is clear text  B、B. Traffic is encrypted  C、C. They are initiated by the LNS  D、D. They are initiated by the LAC  

点击查看答案
第2题

A、Tunnels are initiated by the LAC  B、Tunnels are initiated by the LNS  C、By default, subscriber authentication occurs on the LNS  D、By default, subscriber authentication occurs on the LAC  

点击查看答案
第3题

AA.AhubisconnecteddirectlytoFastEthernet0/5  B、B.FastEthernet0/1isconfiguredasatrunklink.  C、C.FastEthernet0/5hasstaticallyassignedmacaddress  D、D.InterfaceFastEthernet0/2hasbeendisable.  E、E.MultipledevicesareconnecteddirectlytoFastEthernet0/1.  F、F.FastEthernet0/1isconnectedtoahostwithmultiplenetworkinterfacecards.  

点击查看答案
第4题

A、The last policy is the default policy, which allows all traffic.  B、The order of policies is not important.  C、New policies are placed at the end of the policy list.  D、The insert command can be used to change the order.  

点击查看答案
第5题

AA client group is a list of clients associated with a group.  B、A client group is a list of groups associated with a client.  C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.  D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.  

点击查看答案
第7题

A、1 is the default precedence.  B、A lower number is preferred.  C、A higher number is preferred.  D、100 is the default precedence.  

点击查看答案
第8题

AA.Foo.beta() is a valid invocation of beta().  B、B.Foo.alpha() is a valid invocation of alpha().  C、C.Method beta() can directly call method alpha().  D、D.Method alpha() can directly call method beta().  

点击查看答案
第9题

AAH provides data integrity.  B、AH is identified by IP protocol 50.  C、AH is identified by IP protocol 51.  D、AH cannot work in conjunction with ESP  

点击查看答案
第10题

A、LSPs are bidirectional.  B、LSPs are unidirectional.  C、LSPs must follow the IGP's shortest path.  D、LSPs can follow paths other than the IGP's shortest path.  

点击查看答案
客服
TOP

请使用微信扫码支付

订单号:
遇到问题请联系在线客服