Context of communication concerns several factors, including _____. ()
A: who is your listener
B: what is your relationship with the listener
C: what is the distance between you and the listener
D: how you want to present yourself
A: who is your listener
B: what is your relationship with the listener
C: what is the distance between you and the listener
D: how you want to present yourself
举一反三
- ______ 1. What a __________ (marvel) listener you are.
- You issue these LSNRCTL commands: LSNRCTL> SET CURRENT_LISTENER listener01 LSNRCTL> START listener02 What is the result of issuing these commands?() A: A listener named LISTENER is started. B: A listener named LISTENER01 is started. C: A listener named LISTENER02 is started. D: The START command fails and no listener is started.
- You issue these LSNRCTL commands: LSNRCTL> SET CURRENT_LISTENER listener01 LSNRCTL> START listener02 What is the result of issuing these commands?() A: AA listener named LISTENER is started. B: BA listener named LISTENER01 is started. C: CA listener named LISTENER02 is started. D: DThe START command fails and no listener is started.
- Anyone who knows just the host name and the listener name can have full control over the listener. They can stop the listener and also obtain detailed information about the listener, database, and the configuration of the application. How would you avoid this scenario?() A: lock the listener B: hide the listener C: create multiple listeners D: run listener on a remote client E: set a password for the listener F: store listener.ora in a non-default locatio
- Anyone who knows just the host name and the listener name can have full control over the listener. They can stop the listener and also obtain detailed information about the listener, database, and the configuration of the application. How would you avoid this scenario?() A: lock the listener B: hide the listener C: create multiple listeners D: run listener on a remote client E: set a password for the listener F: store listener.ora in a non-default location