1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ruslelena [56]
3 years ago
11

Which of the following is not a SQL*Loader file?

Computers and Technology
1 answer:
MatroZZZ [7]3 years ago
6 0

Answer:

D. Good file

Explanation:

SQL loader is responsible for loading data from files into the database. It needs the mandatory control file, bad file, log file and an optional discard file.

A. Bad file

This file shares its name with the data file and has .bad extension.

The bad file holds all the records which are rejected ( bad data ). If a bad file is not available, it is automatically created. The data is either rejected by the SQL loader or by Oracle itself. The rejected records are not placed in the data file and hence, have to be placed in the bad file.

It is mandatory to have a bad file for every data file.

B. Control file

This is a mandatory file. This is a text file needed by the SQL loader to perform the loading process.

It contains the information related to location of data, specifies the criteria for selecting data for insertion, location for inserting data, and the like.

C. Discard file

The discard file is created if the need arises. This is not a mandatory file to be present.

The data which is discarded and gets filtered out, is placed in the discard file.

The data is not inserted in the table because it does not matches the criteria for the data to be inserted.

This criteria is mentioned in the control file.

The data is discarded only due to the mismatch and not because it is rejected or is bad data.

E. Log file

This file is mandatory to the execution. In absence of log file, the loader does not proceeds with execution and gets terminated.

In the beginning of the execution, a log file must be created by the loader. This file contains all the information regarding the data loading and also the errors encountered during the loading process.

You might be interested in
A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LA
amm1812

Answer:

Option (A) is the right answer.

Explanation:

According to the scenario, the user system is giving the error of invalid certificate while other users on the same network do not report any error, which means that there is some problem in a particular system.

Date and time can also be one of the main cause of this error because wrong date and time creates problem in surfing many websites by giving certificate error.

Hence the most appropriate answer is option (A).

While other option are wrong because of the following reasons:

  • UEFI boot mode is mainly used in booting the operating system and has no connection with network.
  • Logon time is also wrong because if the problem is with the login server, it can not give certificate error.
  • User access control is also not correct because it is used to control the access of the user.
7 0
3 years ago
Can someone help me write an algorithm and a flow chart pls for question 3
emmainna [20.7K]

for i in range(20, 51, 2):

      print(i)

6 0
3 years ago
What is the purpose of the product backlog refinement
BigorU [14]

Answer:

A

Explanation:

6 0
3 years ago
Read 2 more answers
The difference between Return key and word Wrap
saveliy_v [14]
The enter key is used when we want to go directly to the next line while writing whereas through word wrap the cursor automatically shifts to the next line when the word limit for a particular line is exceeded
3 0
3 years ago
Wanna play pubg<br><br><br>ill send u my id​
Nikitich [7]
My sister would what’s your id
6 0
3 years ago
Read 2 more answers
Other questions:
  • _____________ is the characteristic of a resource that ensures that access is restricted to only permitted users, applications,
    14·1 answer
  • Whats the difference between copying a file to my desktop and creating a shortcut?
    8·1 answer
  • Having a conversation with someone using a cellular phone is an example of _________ transmission. simplex full-duplex half-dupl
    11·1 answer
  • What device provides ports to allow a laptop to easily connect to a full-sized monitor, keyboard, ac power adapter, and other pe
    11·1 answer
  • Security administrator for your organization utilized a heuristic system to detect an anomaly in a desktop computer's baseline.
    7·1 answer
  • Which of the following countries have mixed-market economy
    5·1 answer
  • What does an "embedded video" mean
    7·1 answer
  • CAN SOMEONE PLEASE DO THESE FOR ME I WILL GIVE BRAINLIESR AND 20 POINTS PLEASE ITS ONLY 5 QUESTIONS PLEASEEEE
    12·1 answer
  • ¿Cuáles aspectos serían los que más incidirían para que no se pudiera cumplir con el principio de imparcialidad en una auditoría
    11·1 answer
  • JAVA -Develop a program that prompts the user to enter a series of 10 integers and then determines and displays the largest and
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!