多项选择题For which two situations would you use functionality provided by the Resource Manager?()

A. setting idle timeout limits on resource plans
B. saving storage space by using compressed backup sets
C. creating jobs that will run automatically at a scheduled time
D. assigning priorities to jobs to manage access to system resources
E. creating alerts to perform notification when tablespaces are low on available space resources


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题You have not configured Oracle Managed Files (OMF) in your database. You do not want to scan the entire datafile every time an incremental backup is performed. You decide to enable the block change tracking feature. Which statement should you use to enable the block change tracking feature?()

A. ALTER DATABASE ENABLE BLOCK CHANGE TRACKING;
B. ALTER SYSTEM ENABLE BLOCK CHANGE TRACKING USING FILE <path>;
C. ALTER DATABASE ENABLE BLOCK CHANGE TRACKING USING FILE <path>;
D. ALTER SYSTEM ENABLE BLOCK CHANGE TRACKING;

2.单项选择题Which statement is true when Automatic Workload Repository (AWR) baselines are created using baseline templates?()

A. AWR baselines are always created as repeating baselines.
B. AWR baselines can be created on the basis of two time values.
C. AWR baselines are always created with infinite expiration duration.
D. AWR baselines are always created using the Automatic Workload Repository (AWR) retention period as expiration duration.

4.单项选择题

You discover that your Recycle Bin contains two tables with the same name, MY_TABLE. You also have a table named MY_TABLE in your schema.You execute the following statement:
FLASHBACK TABLE my_table TO BEFORE DROP RENAME TO my_table2;
What will be the result of executing this statement?()

A. One of the tables is recovered from the Recycle Bin using a First In First Out (FIFO) approach.
B.One of the tables is recovered from the Recycle Bin using a Last In First Out (LIFO) approach.
C. Both the tables are recovered from the Recycle Bin with one table renamed to MY_TABLE2 and the other to a system-generated name.
D. None of the tables are recovered from the Recycle Bin, and the statement returns an error.

6.单项选择题

Evaluate the following function code:

Which statement is true regarding the above function? ()

A. The cached result becomes invalid when any structural change is done to the EMPLOYEES table.
B. If the function execution results in an unhandled exception, the exception result is also stored in the cache.
C. Each time the function is invoked in a different session, the current result in the result cache gets overwritten.
D. If the function is invoked with a different parameter value, the existing result in the result cache gets overwritten by the latest value.

7.单项选择题You want to use RMAN to create compressed backups.Which statement is true about the compression algorithms that RMAN can use?()

A. The BZIP2 compression algorithm consumes more CPU resources than the ZLIB compression algorithm.
B. The ZLIB compression algorithm consumes more CPU resources than the BZIP2 compression algorithm.
C. The ZLIB compression algorithm provides maximum compression and produces smaller backups than the BZIP2 compression algorithm.
D. Only the BZIP2 compression algorithm can be used to make compressed backups to disk.

9.单项选择题

To control the execution of a server process when it is receiving bad packets from a potentially malicious client, you set the SEC_PROTOCOL_ERROR_FURTHER_ACTION initialization parameter as follows:
SQL> ALTER SYSTEM SET SEC_PROTOCOL_ERROR_FURTHER_ACTION = Drop,10;
What is the significance of this setting?()

A. It terminates the client connection after 10 bad packets and the client cannot reconnect to the same instance.
B. It terminates the client connection after 10 bad packets but the client can still reconnect, and attempt the same operation again.
C. It terminates the client connection 10 seconds after receiving a bad packet and the client cannot reconnect to the same instance.
D. It terminates the client connection after receiving a bad packet and the client can reconnect to the same instance after 10 minutes.

10.单项选择题

Examine the following command:
ALTER DISKGROUP data MOUNT FORCE;
In which scenario can you use the above command to mount the disk group? ()

A. when ASM disk goes offline
B. when one or more ASM files are dropped
C. when some disks in a disk group are offline
D. when some disks in a failure group for a disk group are rebalancing

最新试题

You want to enable automatic PGA memory management in your database. Which setting is required to achieve this?()

题型:单项选择题

You are using Recovery Manager (RMAN) with a recovery catalog to back up your production database. The backups and the archived redo log files are copied to a tape drive on a daily basis. Because of media failure, you lost your production database completely along with the recovery catalog database. You want to recover the target database and make it functional. You consider performing the following steps to accomplish the task:Which option illustrates the correct sequence that you must use?()

题型:单项选择题

Examine the following RMAN command:RMAN> CONFIGURE ENCRYPTION FOR DATABASE ON;RMAN> BACKUP DATABASE PLUS ARCHIVELOG;Which prerequisite must be met before accomplishing the backup?()

题型:单项选择题

Which three statements are true about windows?()

题型:多项选择题

Which three functions are performed by the SQL Tuning Advisor? ()

题型:多项选择题

View the Exhibit and examine the output.You execute the following RMAN command to perform the backup operation:What is the multiplexing level in the preceding backup process()

题型:单项选择题

Which two statements are true about a job chain?()

题型:多项选择题

To enable faster incremental backups, you enabled block change tracking for the database.Which two statements are true about the block change tracking file?()

题型:多项选择题

Which three statements are true about persistent configuration?()

题型:多项选择题

What does the DB_FLASHBACK_RETENTION_TARGET parameter configure?()

题型:单项选择题