A.large pool
B.shared pool
C.data buffer cache
D.redo log buffer
E.data dictionary cache
您可能感兴趣的试卷
你可能感兴趣的试题
A.RMAN keeps a list of archive logs in a text file.
B.The DBA must manually tell RMAN which archive logs to backup.
C.RMAN has access to target control file and/or catalog information.
D.RMAN looks at the ARCHIVE_LOG_DEST parameter of your target database and backs up all archive logs found.
A.To verify space requirements in the target database before importing.
B.To generate the SQL for the DDL operations that would occur during import.
C.To check character set compatibility between the export file and the target database.
D.To check for integrity constraint violations that would occur in the target database.
A.data files
B.backup sets
C.control files
D.archived redo log files
A.A database backup, combined with archived redo log files, guarantees that all committed data can be recovered to the point of failure.
B.During recovery the ARCn background process copies its redo entries identified for recovery by the control file to the data files.
C.After each write to an archived log, the mandatory background process ARCn writes its log sequence number and the first and last SCN number within the log sequence to the control file.
D.At database recover time, and archived redo log is uniquely identified for recovery use by its redo thread number and destination ID number retrieved from the control file.
A.ARCHIVELOG mode.
B.NOARCHIVELOG mode.
C.Open database backups.
D.Consistent whole backups.
A.user-managed backups.
B.partial database backups.
C.consistent database backups.
D.inconsistent database backups.
A.Directory server
B.Hostname adaptor
C.TCP/IP host file
D.Connection Manager
E.connecting pooling
F.external procedures
G.listener names and protocol addresses
H.Net Service names in a tnsnames.ora file
I.naming methods the client uses to resolve connect identifiers
A.data files
B.control file
C.password file
D.online redo log files
E.initialization parameter file
最新试题
The three tasks shown have been completed in order to configure a naming method: Task 1: Installed on server and client: Oracle Net Services, TCP/IP, TCP/IP protocol adaptor Task 2: Started default listener on port 1521 Task 3: Added global database name to the listener.ora file. Which naming method was configured?()
Where can you obtain information about full database backup set created using RMAN, if the control file was used as the repository?()
The database is being restored from a closed backup. The data files, control files, password file, and parameter file are available, but the online redo logs are not. Because the online redo logs are not available, you must simulate recovery and alter the database open with the reset logs option so the online redo logs are created while the database opens. Which type of recover is used in this situation?()
Which of the following views must you query to identify any corrupt data file blocks that have been detected during backup set creation?()
Which of the following roles must be granted to a user to perform a full database import?()
As a result of a media failure, the current online redo log group is corrupted. The database crashes, as the current online group is inaccessible. Which type of incomplete recovery are you most likely to perform? ()
Which Oracle background process frees SGA resources that were allocated to a user process that failed?()
After a number of days set by the parameter CONTROL_FILE_RECORD_KEEP_TIME, the information in the control file is overwritten by RMAN. What is this parameter’s default value?()
Which of the following parameters must be specified to define the number of dispatchers that need to be started?()
What is the maximum database block size supported for the Oracle9i database?()