in Technology by

Which privillega from the following is used to create a private sybonym in another user's schema?

a. CREATE SYNONYM

b. CREATE PUBLIC SYNONYM

c. CREATE ANY SYNONYM

d. None of the above

1 Answer

0 votes
by

Which privillega from the following is used to create a private sybonym in another user's schema?

a. CREATE SYNONYM

b. CREATE PUBLIC SYNONYM

c. CREATE ANY SYNONYM

d. None of the above

Correct answer is :- c. CREATE ANY SYNONYM

Related questions

0 votes
    Rownum numbers the records in a result set. a. False b. True...
asked Feb 19, 2023 in Technology by JackTerrance
0 votes
    IN and NOT IN operations decreases the performance of an SQL query compared to AND/OR operations. it it True or False? a. True b. False...
asked Feb 19, 2023 in Technology by JackTerrance
0 votes
    How to concatenate multiple rows into a single string in sql a. COALESCE b. STRING_AGG C. Option 1 & 2 d. None of the above...
asked Feb 19, 2023 in Technology by JackTerrance
0 votes
    Views are created on top of Materialized views a. False b. True...
asked Feb 19, 2023 in Technology by JackTerrance
0 votes
    Which privilege from the following is used to create a private synonym in another user's schema? a. CREATE SYNONYM b. ... PUBLIC SYNONYM c. CREATE ANY SYNONYM d. None of the above...
asked Mar 20, 2023 in Technology by JackTerrance
0 votes
    If the AD B2B account is e-reference, can an admin block this? Could an admin prevent their users from being guest users in another tenant?...
asked Mar 10, 2021 in Technology by JackTerrance
0 votes
    Which of the following can be used to prevent end users from entering malicious scripts? (1)Input validation (2)Server side encoding (3)Authentication (4)Dynamic encoding...
asked May 17, 2021 in Technology by JackTerrance
0 votes
    The Function Key F5 is used in a webpage to___________the page (a) Exit (b) Create another window (c) Reload (d) Add a new tab Select the correct answer from above options...
asked Dec 24, 2021 in Education by JackTerrance
0 votes
    What common web scripting languages are used by attackers to fetch various details from its surfing users? (a) Tcl ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    How to create empty tables with the same structure as another table?...
asked Dec 11, 2020 in Technology by JackTerrance
0 votes
    Which of the following are famous and common cyber-attacks used by hackers to infiltrate the user's system? DDos ... & Malvertising Phishing and Password attacks All of the above...
asked Mar 6, 2021 in Technology by JackTerrance
0 votes
    Which of the following is used to draw in users and infect them and deploy fast changing infrastructures? Select the ... from below options A)Malnet B)Trojans C)Botnet D)Honeynet...
asked Dec 3, 2020 in Technology by Editorial Staff
0 votes
    Which of the following has each related entity set has its own schema and there is an additional schema ... , Database Interview Questions and Answers for Freshers and Experience...
asked Oct 11, 2021 in Education by JackTerrance
0 votes
    In which of the following, a separate schema is created consisting of that attribute and the primary key ... , Database Interview Questions and Answers for Freshers and Experience...
asked Oct 11, 2021 in Education by JackTerrance
...