A.SQL script B.PL/SQL script C.Operating System (OS) script D.Enterprise Manager (EM) script E.Recovery Manager (RMAN) script
You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis. How would you achieve this?()
A.by using triggers B.by using external tables C.by using anonymous PL/SQL blocks D.by auditing all DML operations on the table
A.A leaf will be marked as invalid. B.An update in a leaf row takes place. C.The index will be updated automatically at commit. D.A leaf row in the index will be deleted and inserted. E.The index becomes invalid when you make any updates.