answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ruslelena [56]
2 years ago
11

Which of the following is not a SQL*Loader file?

Computers and Technology
1 answer:
MatroZZZ [7]2 years ago
6 0

Answer:

D. Good file

Explanation:

SQL loader is responsible for loading data from files into the database. It needs the mandatory control file, bad file, log file and an optional discard file.

A. Bad file

This file shares its name with the data file and has .bad extension.

The bad file holds all the records which are rejected ( bad data ). If a bad file is not available, it is automatically created. The data is either rejected by the SQL loader or by Oracle itself. The rejected records are not placed in the data file and hence, have to be placed in the bad file.

It is mandatory to have a bad file for every data file.

B. Control file

This is a mandatory file. This is a text file needed by the SQL loader to perform the loading process.

It contains the information related to location of data, specifies the criteria for selecting data for insertion, location for inserting data, and the like.

C. Discard file

The discard file is created if the need arises. This is not a mandatory file to be present.

The data which is discarded and gets filtered out, is placed in the discard file.

The data is not inserted in the table because it does not matches the criteria for the data to be inserted.

This criteria is mentioned in the control file.

The data is discarded only due to the mismatch and not because it is rejected or is bad data.

E. Log file

This file is mandatory to the execution. In absence of log file, the loader does not proceeds with execution and gets terminated.

In the beginning of the execution, a log file must be created by the loader. This file contains all the information regarding the data loading and also the errors encountered during the loading process.

You might be interested in
The population of town A is less than the population of town B. However, the population of town A is growing faster than the pop
defon

Answer:

#include<iostream>

using namespace std;

void main()

{

int townA_pop,townB_pop,count_years=1;

double rateA,rateB;

cout<<"please enter the population of town A"<<endl;

cin>>townA_pop;

cout<<"please enter the population of town B"<<endl;

cin>>townB_pop;

cout<<"please enter the grothw rate of town A"<<endl;

cin>>rateA;

cout<<"please enter the grothw rate of town B"<<endl;

cin>>rateB;

while(townA_pop < townB_pop)//IF town A pop is equal or greater than town B it will break

{

townA_pop = townA_pop +( townA_pop * (rateA /100) );

townB_pop = townB_pop +( townB_pop * (rateB /100) );

count_years++;

}

cout<<"after "<<count_years<<" of years the pop of town A will be graeter than or equal To the pop of town B"<<endl;

}

Explanation:

3 0
2 years ago
Developed by ibm and refined by symantec, the __________ provides a malware detection system that will automatically capture, an
Nadya [2.5K]
Digital Immune System (DIS)
6 0
2 years ago
The function below takes a single string parameter: sentence. Complete the function to return everything but the middle 10 chara
dolphi86 [110]

Answer:

def get_middle_ten(sentence):

   ind = (len(sentence) - 12) // 2

   return sentence[ind:ind + 12]

# Testing the function here. ignore/remove the code below if not required

print(get_middle_twelve("abcdefghijkl"))

print(get_middle_twelve("abcdefghijklmnopqr"))

print(get_middle_twelve("abcdefghijklmnopqrst"))

7 0
2 years ago
The technique where a system clock generates interrupts, and at each clock interrupt the OS regains control and assigns the proc
Misha Larkins [42]

Answer: Time slicing

Explanation:

 Time slicing is one of the technique that basically implement the multitasking in the operating system. It basically generate the interrupt and at the each clock of the interrupt in the operating system basically regain  control and then assign that particular system or processor to the another user.

Time slice are typically work in milliseconds. By using the multi users system, the time slice is the total amount of the processing time for the each user get assigned.

7 0
2 years ago
Acceleration is the rate at which an object changes its velocity. It is typically represented by symbol a and measured in m/s2 (
Natalija [7]

Answer:

<u>Pseudocode:</u>

INPUT velocity

INPUT time

SET velocity = 0.44704 * velocity

SET acceleration = velocity / time

SET acceleration = round(acceleration, 1)

PRINT acceleration

<u>Code:</u>

velocity = float(input("Enter a velocity in miles per hour: "))

time = float(input("Enter a time in seconds: "))

velocity = 0.44704 * velocity

acceleration = velocity / time

acceleration = round(acceleration, 1)

print("The acceleration is {:.2f}".format(acceleration))

Explanation:

*The code is in Python.

Ask the user to enter the velocity and time

Convert the miles per hour to meters per second

Calculate the acceleration using the formula

Round the acceleration to one decimal using round() method

Print the acceleration with two decimal digits

7 0
2 years ago
Other questions:
  • A corporation needs an operating system that allows the various teams in its office to network and collaborate on projects. Whic
    14·1 answer
  • Represent decimal number 8620 in (a) BCD, (b) excess-3 code, (c)2421 code, and (d) as a binary number
    7·1 answer
  • Explain briefly why the crowd sourcing technique could help a single individual with a difficult personal decision.
    14·1 answer
  • Consider the following method intended to modify the parameter names by removing all instances of the String n.
    14·1 answer
  • Pressing and holding _______ while clicking enables you to select multiple contiguous files or folders.
    15·1 answer
  • You learn that in a previous security breach at GearUp, a disgruntled employee destroyed the encryption key that had been used t
    7·1 answer
  • A script sets up user accounts and installs software for a machine. Which stage of the hardware lifecycle does this scenario bel
    5·1 answer
  • Seneca has just applied conditional formatting and realizes that she has made a mistake. Which action should she take to fix the
    12·2 answers
  • Suppose a switch is built using a computer work station and that it can forward packets at a rate of 500,000 packets per second,
    11·1 answer
  • Laura is the first person in her SDLC team to detect and predict security vulnerabilities in the software. In which phase is Lau
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!