网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Two database users, Jack and Bill, are accessing the SupportCenter STAFF table of the SupportCenter DB database. When Jack modifies a value in the table, the new value is invisible to Bill. Which is the modified value invisible to Bill?()
A

The modified data are not available on disk.

B

The modified data have been flushed out from memory.

C

The modified rows of the SupportCenter STAFF table have been locked.

D

Jack has not committed the changes after modifying the value.

E

Both users are accessing the database from two different machines.


参考答案

参考解析
解析: 暂无解析
更多 “单选题Two database users, Jack and Bill, are accessing the SupportCenter STAFF table of the SupportCenter DB database. When Jack modifies a value in the table, the new value is invisible to Bill. Which is the modified value invisible to Bill?()A The modified data are not available on disk.B The modified data have been flushed out from memory.C The modified rows of the SupportCenter STAFF table have been locked.D Jack has not committed the changes after modifying the value.E Both users are accessing the database from two different machines.” 相关考题
考题 Jack and Bill are twins, but the former is taller than ________. A.laterB.lateC.latestD.the latter

考题 To enable faster incremental backups, you enabled block change tracking for the database.Which two statements are true about the block change tracking file? ()(Choose two.) A. Multiple change tracking files can be created for a database.B. The change tracking file must be created after the first level 0 backup.C. RMAN does not support backup and recovery of the change tracking file.D. The database clears the change tracking file and starts tracking changes again, after whole database restore and recovery operations.

考题 You Execute the Following command to create a password file in the database server:$ orapwd file = ‘+DATA/PROD/orapwprod entries = 5 ignorecase = N format = 12’Which two statements are true about the password file?()A. It records the usernames and passwords of users when granted the DBA role.B. It contains the usernames and passwords of users for whom auditing is enabled.C. Is used by Oracle to authenticate users for remote database administration.D. It records the usernames and passwords of all users when they are added to the OSDBA or OSOPER operating system groups.E. It supports the SYSBACKUP, SYSDG, and SYSKM system privileges.

考题 You executed this command to create a password file:$ orapwd file = orapworcl entries = 10 ignorecase = NWhich two statements are true about the password file?() A. It will permit the use of uppercase passwords for database users who have been granted the SYSOPER role.B. It contains username and passwords of database users who are members of the OSOPER operating system group.C. It contains usernames and passwords of database users who are members of the OSDBA operating system group.D. It will permit the use of lowercase passwords for database users who have granted the SYSDBA role.E. It will not permit the use of mixed case passwords for the database users who have been granted the SYSDBA role.

考题 Two database users, Jack and Bill, are accessing the Certkiller STAFF table of the Certkiller DB database. When Jack modifies a value in the table, the new value is invisible to Bill.  Which is the modified value invisible to Bill?()A、The modified data are not available on disk.B、The modified data have been flushed out from memory.C、The modified rows of the Certkiller STAFF table have been locked.D、Jack has not committed the changes after modifying the value.E、Both users are accessing the database from two different machines.

考题 You have an Exchange Server 2010 server.You need to prevent users from accessing public folders by using Outlook Web App (OWA).Your solution must not prevent users from accessing public folders by using Office Outlook. Which two actions should you perform?()A、Create a managed folder mailbox policy.B、Modify the properties of the OWA virtual directory.C、Modify the default Outlook Web App Mailbox policy.D、Modify the properties of the public folder database.

考题 You need to design a configuration for Exchange Server storage that meets the business and technical requirements. What should you do?()A、Create a single storage group. Create one database for all usersB、Create two storage groups. In each storage group, create one database. Place mailboxes for remote users in one storage group database, and place all other mailboxes in the other storage group databaseC、Create two storage groups. In each storage group, create one database. Place executive mailboxes in one storage group database, and place all other mailboxes in the other storage group databaseD、Create two storage groups. In one storage group, create a database, and place all mailboxes for remote users and executives in the database. In the other storage group, create a database for all other mailboxes

考题 A customer has an 8-way p650 running an application for about 200 users.  In the past, the requiredamount of memory and processors has increased proportionally to the number of new users.  The customer plans to increase users by 10% each year for the next three years.  Next year, a database will be added to the workload to support the users directly rather than being on a separate machine. What is the most likely result of this projected growth?()A、Disk usage will increase in proportion to memory.B、The new database will demand much more memory.C、Memory demand will increase 10% for the next year.D、Processor demand will increase about 10% for the next year.

考题 What are two common reporting requirements?()A、the database connectivity methodB、the number of users in the solutionC、the number of reports being installed D、ability to send completed reports by e-mailE、reporting output available in Microsoft Excel

考题 A customer has a database application that is accessed by a large number of people through a web interface from multiple remote locations.  Which of the following questions will provide the information necessary to design the best performing storage solution?()A、How many web servers will be connected to the database?B、Will the database be run on a Windows solution?C、How many concurrent users will be accessing the database?D、What are the types of transactions run against the database?

考题 A junior level Database Administrator erroneously deleted the database alert log while users were accessing the database. Which action should you take to recover the alert log?()  A、 Do nothing.B、 Restart the database.C、 Perform recovery on the database.D、 Restore the alert log from the last backup.

考题 You work as a database administrator for Supportcenter.cn. In a production environment, users complain about the slow response time when accessing the database. You have not optimized the memory usage of the Oracle instance and you suspect the problem to be with the memory. To which type of object would you refer to determine the cause of the slow response?()A、The trace fileB、The fixed viewsC、The data dictionary viewsD、The operating system log fieldsE、The dynamic performance views.

考题 You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements: SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM; SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT; For which database users is the audit policy now active?()A、All users except SYSB、All users except SCOTTC、All users except sys and SCOTTD、All users except sys, system, and SCOTT

考题 What are three purposes of the RMAN “FROM” clause?()A、to support PUSH-based active database duplicationB、to support synchronization of a standby database with the primary database in a Data environmentC、To support PULL-based active database duplicationD、To support file restores over the network in a Data Guard environmentE、To support file recovery over the network in a Data Guard environment

考题 多选题What are two common reporting requirements?()Athe database connectivity methodBthe number of users in the solutionCthe number of reports being installedDability to send completed reports by e-mailEreporting output available in Microsoft Excel

考题 单选题A junior level Database Administrator erroneously deleted the database alert log while users were accessing the database. Which action should you take to recover the alert log?()A  Do nothing.B  Restart the database.C  Perform recovery on the database.D  Restore the alert log from the last backup.

考题 单选题A retail customer has a database application that is accessed by a large number of people through a web interface from multiple remote locations. Which questions will provide the information necessary to design the best performing storage solution of the following?()A How many web servers will be connected to the database?B How many concurrent applications will run against the database?C How many concurrent users will be accessing the database?D What are the types of transactions run against the database?

考题 单选题You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. There is a user in the Windows SalesManagers group, and he is called Simon. A Reporting Services report is required by Simon to have annual sales information displayed by territory. There is another user in the Windows Sales group, and he is called Jack. He is responsible to report to Simon. A report is required by Jack, and the report is limited to his sales territory, but the same detailed sales data is still displayed, and the detailed sales data is on Simon’s report. A secure solution should be designed to meet the requirements of the users listed above, and the least amount of server resources should be utilized.  Which action should be performed?()A First, all territory information should be contained by a parameterized report which is designed for Simon. Second, a linked report that links to Simons report should be designed for Jack.B First, two data regions should be contained by a report which is designed for Simon. Second, one data region should be utilized for summary sales data. Third, the other data region should be utilized for the detailed sales data for each sales representative. Four, a report that displays the detailed sales data should be designed for Jack.C First, two reports should be designed for Simon. Second, the territory information should be contained by one, and the detailed sales data should be contained by another. At last, a report that displays the detailed sales data for Jack’s territories should be designed for Jack.D First, the territory information should be contained by a report which is designed for Simon. Second, a report which detailed sales data for Jack’s territories is contained should be designed for Jack. Third, Simon’s report should be set to have the data in Jacks report contained.

考题 填空题It has been found that the adventurer “Swiftwater” Bill Gates had greatly influenced Jack London’s books.____

考题 单选题Two data files have been deleted at the operating system level by accident. Your database is running in ARCHIVELOG mode and online backups are taken nightly. One of the data files that has been deleted belongs to the USERS tablespace on the other belongs to the SYSTEM tablespace. How can you recover from this situation?()A Shut down the database, restore the two data files and then start up the database. B Take the system and users tablespace offline, restore the two data files, recover the two datafiles, and then bring the SYSTEM and USERS tablespaces online. C Shut down the database, restore the two data files, start up the database in MOUNT mode, recover the two data files, and then alter the database open. D Take the SYSTEM and USERS tablespaces offline, recover the two datafiles and then bring the SYSTEM and USERS tablespaces online.

考题 单选题Your database instance is currently configured to support 1,500 connections. The Web applicationthat uses the database allows a large number of users to work with the database simultaneously. Someusers of the Web application do not interact with the server all the time.  You want to increase the scalability by configuring the database instance to handle more connections. Asa DBA,  which configuration would you set to support more than 1,500 connections at a time()A You would configure more listeners for the database.B You would configure the database in shared server mode to use the connection pooling feature.C You would increase the value of the PGA_AGGREGATE_TARGET initialization parameter that assigns more session memory to users.D You would decrease the value of the PRIVATE_SGA resource limit in the profiles used by the users to accommodate more session information.

考题 多选题You work as a database administrator for Supportcenter.cn. Users in the SupportCenter PROD database complain about the slow response when accessing the database. In the Active Session Waiting: Configuration page you find that the majority of the wait time is for the redo log buffer. Further investigation using the Run Queue graph and operating system tools reveals that the redo log files are on the same disks, and that the disk I/O for the redo log files is the reason for the performance degradation.  Which two actions would you take to gain performance?()AIncrease the size of redo log filesBIncrease the size of redo log bufferCIncrease the number of redo log filesDPlace the redo log files on a separate diskEDecrease the number of redo log groups to twoFIncreate the number Log Writer (LGWR) process

考题 多选题You executed this command to create a password file: $ orapwd file = orapworcl entries = 10 ignorecase = N Which two statements are true about the password file?()AIt will permit the use of uppercase passwords for database users who have been granted the SYSOPER role.BIt contains username and passwords of database users who are members of the OSOPER operating system group.CIt contains usernames and passwords of database users who are members of the OSDBA operating system group.DIt will permit the use of lowercase passwords for database users who have granted the SYSDBA role.EIt will not permit the use of mixed case passwords for the database users who have been granted the SYSDBA role.

考题 多选题What are three purposes of the RMAN “FROM” clause?()Ato support PUSH-based active database duplicationBto support synchronization of a standby database with the primary database in a Data environmentCTo support PULL-based active database duplicationDTo support file restores over the network in a Data Guard environmentETo support file recovery over the network in a Data Guard environment

考题 单选题Your database is in ARCHIVELOG mode. On Friday evening, you perform an online database backup by using the BACKUP DATABASE command at the Recovery Manager (RMAN) prompt and close the  database. On Monday, the System Administrator informs you about the failure of two hard disks. One of the lost disks contains two datafiles, HR1.DBF and HR2.DBF, both of which belong to a read/write tablespace named HR. The disk also contains a datafile, USERS.DBF, which belongs to a read/write tablespace named USERS. You need to restore and recover the database backup that was performed on Friday evening. After mounting the database, you issue the following RMAN commands:        RMANRESTORE DATABASE;        RMANRECOVER DATABASE;   After successfully executing these RMAN commands, you issue the following statement using SQL*Plus:        SQLALTER DATABASE OPEN;   You receive the following errors when attempting to open the database:        ORA-01157: cannot identify/lock data file 10 see DBWR trace file        ORA-01110: data file 10: ’D:///USERS.DBF’   What is the cause of these errors?()A  The USERS.DBF datafile is corrupted and cannot be restored by RMAN.B  The USERS.DBF datafile was not backed up using the RMAN BACKUP DATABASE command.C  The USERS.DBF datafile was not restored using the RMAN RESTORE DATABASE command.D  The USERS.DBF datafile was not recovered using the RMAN RECOVER DATABASE command.

考题 单选题Bill can inspect a case of cell phones in 6 hours. Jack can inspect the same case of cell Phones in 4 hours. After working alone for l hour, Bill stops for lunch. After taking a 30-minute lunch break. Bill and Jack work together to inspect the remaining cell phones. How long do Bill and Jack work together to complete the job?A 1 hr. and l2 minB 1 hr. and 24 minC 2 hrsD 2 hrs and lo minE 2 hrs and 20 min

考题 多选题To enable faster incremental backups, you enabled block change tracking for the database.Which two statements are true about the block change tracking file? ()(Choose two.)AMultiple change tracking files can be created for a database.BThe change tracking file must be created after the first level 0 backup.CRMAN does not support backup and recovery of the change tracking file.DThe database clears the change tracking file and starts tracking changes again, after whole database restore and recovery operations.

考题 单选题Two database users, Jack and Bill, are accessing the SupportCenter STAFF table of the SupportCenter DB database. When Jack modifies a value in the table, the new value is invisible to Bill. Which is the modified value invisible to Bill?()A The modified data are not available on disk.B The modified data have been flushed out from memory.C The modified rows of the SupportCenter STAFF table have been locked.D Jack has not committed the changes after modifying the value.E Both users are accessing the database from two different machines.