网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Your system performs heavy transaction processing between 8:00 A.M. and 5:00 P.M. but runs batch processing and reports after that. You decide to create a separate resource plan to govern resource allocation for each time period. Which scheduler object will you use to switch automatically between the two resource plans?()  

  • A、 Window
  • B、 Program
  • C、 Job_Class
  • D、 Window group

参考答案

更多 “Your system performs heavy transaction processing between 8:00 A.M. and 5:00 P.M. but runs batch processing and reports after that. You decide to create a separate resource plan to govern resource allocation for each time period. Which scheduler object will you use to switch automatically between the two resource plans?()  A、 WindowB、 ProgramC、 Job_ClassD、 Window group” 相关考题
考题 Your organization decided to upgrade the existing Oracle 10g database to Oracle 11g database in a multiprocessor environment. At the end of the upgrade, you observe that the DBA executes the following script:SQL @utlrp.sqlWhat is the significance of executing this script?()A. It performs parallel recompilation of only the stored PL/SQL code.B. It performs sequential recompilation of only the stored PL/SQL code.C. It performs parallel recompilation of any stored PL/SQL as well as Java code.D. It performs sequential recompilation of any stored PL/SQL as well as Java code.

考题 controls the operation of the computer and performs it's data processing functions.A.CPUB.Hard diskC.MemoryD.Database system

考题 Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()A. core layerB. bridging two VLANs on one switchC. between two Layer 2 devices withtrunkingD. between two Layer 2 devices withouttrunking

考题 With our new Quick Pay system, your monthly subscription fee will be debited automati-cally from the bank account of your__________.A.choice B.choose C.choices D.chose

考题 In order to log()the system you have to type in your password.AinBonCin toDoff to

考题 In order to log()the system you have to type in your password.A、inB、onC、in toD、off to

考题 Which three functions are associated with a Cisco Unified CallManager? ()A、 connects traditional telephony devices to voice over IP infrastructureB、 converts analog signals to digital formatC、 performs voice compressionD、 performs call processingE、 performs dial plan administrationF、 performs signaling and device control

考题 After installing a new p5 595, the system performs poorly. Which of the following services would provide updates needed to fix the problem?()A、AlertB、Fix CentralC、Software MaintenanceD、Performance Monitoring

考题 在安装WINDOWS时,屏幕出现死机并有如下显示:windows setup was unable to update your system files. This may be virus dedication that is built-in to your machine,or by virus dedication software running on your system„„,故障原因是()A、安装盘有问题B、CD-ROM驱动器有问题C、没有关闭所有的病毒监测程序D、硬盘有问题

考题 Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()A、 has a permissive interface that is used to monitor networksB、 is an active device in the traffic pathC、 passively listens to network trafficD、 has a promiscuous interface that is used to monitor the network

考题 Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()A、 core layerB、 bridging two VLANs on one switchC、 between two Layer 2 devices with trunkingD、 between two Layer 2 devices without trunking

考题 A system administrator performs a full backup every Saturday evening and incremental backups the rest of the week. The system failed on Thursday and needs to be restored. Which backup tapes will be required to restore the system to its most recent recoverable state?()A、Saturday’s full backup tape onlyB、Wednesday’s incremental backup tape onlyC、Saturday’s full backup and Wednesday’s incremental backup tapesD、Saturday’s full backup and Sunday’s through Wednesday’s incremental backup tapes

考题 Every Sunday the Unix system administrator has a job that executes a full backup of the entire Unix system your database is on. Is this backup usable for backup and recovery of your database?()  A、 Yes, if the database is in ARCHIVELOG modeB、 Yes, if the database is in NOARCHIVELOG modeC、 No, the backup is not usable in any wayD、 Only if the ENABLE_ONLINE_BACKUP parameter is set to TRUE

考题 You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()A、Control Panel  Data Sources (ODBC).B、Control Panel  System Tools  Shared Folders.C、Computer Management  System Tools  System Information.D、Computer Management  System Tools  Shared Folders  Open Files.E、Computer Management  System Tools  Shared Folders  Sessions.F、Computer Management  System Tools  Shared Folders  Shares.

考题 A router that performs Network Address Translation (NAT) is installed between your computer and the Internet.  The router fails. You connect the computer directly to the Internet.  You need to ensure that the computer is connected to the Internet in the most secure manner possible.  What should you do?()A、Enable the Remote Desktop feature in the System Properties dialog box.B、Configure the network category of your network connection to Public.C、Configure the network category of your network connection to Private.D、Enable the Windows Collaboration Computer Name Registration Service exception in Microsoft Windows Firewall.

考题 You are a network administrator for your company. You currently automate backups of the System State data on the servers in your network by using NTBackup. Your manager instructs you to document the procedure for restoring a server from a backup of the System State data.You need to select the correct method for performing a restoration of a backup of the System State data.What should you do?()A、Run the following command: ntbackup.exe backup /F {"FileName"}B、Run the following command: ntbackup.exe backup systemstate /F {"FileName"}C、In Control Panel, open System, and configure the Startup and Recovery settings on the Advanced tab.D、Use NTBackup interactively.

考题 单选题You should assemble the Windows Sound System microphoneA before you have installed your audio hardware.B before you connect it to your hardware.C after you have connected it to your hardware.

考题 单选题If your bridge-to-bridge radiotelephone ceases to operate,you must().A immediately anchor your vessel and arrange for repairs to the systemB moor your vessel at the nearest dock available and arrange for repairs to the systemC arrange for the repair of the system to be completed within 48 hoursD exercise due diligence to restore the system at the earliest practicable time

考题 单选题You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()A Control Panel  Data Sources (ODBC).B Control Panel  System Tools  Shared Folders.C Computer Management  System Tools  System Information.D Computer Management  System Tools  Shared Folders  Open Files.E Computer Management  System Tools  Shared Folders  Sessions.F Computer Management  System Tools  Shared Folders  Shares.

考题 单选题Your system performs heavy transaction processing between 8:00 A.M. and 5:00 P.M. but runs batch processing and reports after that. You decide to create a separate resource plan to govern resource allocation for each time period. Which scheduler object will you use to switch automatically between the two resource plans?()A  WindowB  ProgramC  Job_ClassD  Window group

考题 单选题Your organization decided to upgrade the existing Oracle 10g database to Oracle 11g database in a multiprocessor environment. At the end of the upgrade,you observe that the DBA executes the following script:   SQL @utlrp.sql   What is the significance of executing this script?()A  It performs parallel recompilation of only the stored PL/SQL code.B  It performs sequential recompilation of only the stored PL/SQL code.C  It performs parallel recompilation of any stored PL/SQL as well as Java code.D  It performs sequential recompilation of any stored PL/SQL as well as Java code.

考题 单选题You are operating your database in NOARCHIVELOG mode. Your most recent backup includes a copy of all of the data files and the control files taken when the current log sequence number was 45. You experience disk failure on the drive on which your SYSTEM tablespace data files are stored. At the time of the failure, the current log sequence number is 98. Which files should you restore to recover from the loss of the SYSTEM tablespace data files?()A Only the data files.B All of the data files and the control files.C Only the data files belonging to the SYSTEM tablespace.D Only the data files belonging to the SYSTEM tablespace and the control files.

考题 单选题Your company decided to start using RMAN in its backup strategy. Previously your company used operating system file copies. Which command is used to make RMAN aware of existing backups made by copying files at the operating system?()A CHANGEB RESYNCC CATALOGD CROSSCHECK

考题 单选题Every Sunday the Unix system administrator has a job that executes a full backup of the entire Unix system your database is on. Is this backup usable for backup and recovery of your database?()A  Yes, if the database is in ARCHIVELOG modeB  Yes, if the database is in NOARCHIVELOG modeC  No, the backup is not usable in any wayD  Only if the ENABLE_ONLINE_BACKUP parameter is set to TRUE

考题 单选题How can you verify that you have correctly configured SSH access to your Junos device?()A user@router# show system servicesB user@router show configuration servicesC user@router# show configuration system servicesD user@router# show system login

考题 单选题In order to log()the system you have to type in your password.A inB onC in toD off to

考题 单选题Which command copies the factory-default files to your backup media?()A request system snapshot rescueB request system snapshot factoryC request system snapshot defaultD request system snapshot as-primary