单选题Your system performs heavy transaction processing between 8:00 A.M. and 5:00 P.M. but runs batch processing and reports after that. You decide to create a separate resource plan to govern resource allocation for each time period. Which scheduler object will you use to switch automatically between the two resource plans?()A WindowB ProgramC Job_ClassD Window group

单选题
Your system performs heavy transaction processing between 8:00 A.M. and 5:00 P.M. but runs batch processing and reports after that. You decide to create a separate resource plan to govern resource allocation for each time period. Which scheduler object will you use to switch automatically between the two resource plans?()
A

 Window

B

 Program

C

 Job_Class

D

 Window group


参考解析

解析: 暂无解析

相关考题:

controls the operation of the computer and performs its data processing functions.A.CPUB.DiskC.MemoryD.I/O

Your company has an existing Windows Communication Foundation (WCF) service that allows business partners to place orders. The service uses netMsmqBinding. You find that processing every order in its own transaction is causing a delay. You need to ensure that the service is configured to process multiple orders in one transaction. What should you do? ()A. Useservice behavior and set the maxConcurrentCalls attribute.B. Useendpoint behavior and set the maxBatchSize attribute.C. Useendpoint behavior and set the maxPendingReceives attribute.D. Useendpoint behavior.

The double-entry accounting system records each transaction twice.()

method is the use of a data processing system to represent selected behavioral(67)of a physical or abstract system. For example, the representation of air streams around airfoils at various velocities, temperatures, and air pressures with such a system.Emulation method is slightly different, it uses a data processing system to imitate another data processing system, so that the imitating system accepts the same data, executes the same programs, and achieves the same(68) as the imitated system. Emulation is usually achieved(69) hardware or firmware. In a network, for example, microcomputers might emulate terminals(70) communicate with mainframe.A.AssemblyB.SimultaneityC.FraudD.Simulation

A router that performs Network Address Translation (NAT) is installed between your computer and the Internet.The router fails. You connect the computer directly to the Internet.You need to ensure that the computer is connected to the Internet in the most secure manner possible.What should you do?()A.AB.BC.CD.D

controls the operation of the computer and performs it's data processing functions.A.CPUB.Hard diskC.MemoryD.Database system

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()A. core layerB. bridging two VLANs on one switchC. between two Layer 2 devices withtrunkingD. between two Layer 2 devices withouttrunking

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()A、core layerB、bridging two VLANs on one switchC、between two Layer 2 devices withtrunkingD、between two Layer 2 devices withouttrunking

In one of your online transaction processing (OLTP) applications, most users frequently modify the values, including the key values, of the application tables. Some users generate application reports by using multiple application tables.  What is the best table structure that you can use to gain optimal performance?()A、heap tableB、object tableC、external tableD、clustered tableE、global temporary tableF、index­organized table (IOT)

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()A、 core layerB、 bridging two VLANs on one switchC、 between two Layer 2 devices with trunkingD、 between two Layer 2 devices without trunking

A user can no longer launch their word processing program. The program worked fine yesterday.Which of the following options could BEST be used to fix the word processing program?()A、Safe ModeB、Automated System RecoveryC、Last Known Good ConfigurationD、System Restore

When a system has both online transaction processing as well as large batch processing, which of the following common procedures will best help to improve system performance?()A、 Boost the priority of batch jobs.B、 Schedule batch runs to reduce contention with OLTP.C、 Schedule OS maintenance such that it includes frequent application of PTFs.D、 Perform incremental backups of transaction processing and full backups of batch processing.

Your system performs heavy transaction processing between 8:00 A.M. and 5:00 P.M. but runs batch processing and reports after that. You decide to create a separate resource plan to govern resource allocation for each time period. Which scheduler object will you use to switch automatically between the two resource plans?()  A、 WindowB、 ProgramC、 Job_ClassD、 Window group

You want to create a new optimized database for your transactional production environment to be used by a financial application. While creating the database, you want the Oracle software to take care of all basic settings to optimize the database performance. Which method would you use to achieve this objective?()A、Use the CREATE DATABASE .. command to create the database with Oracle-managed files. B、Use the Database Configuration Assistant (DBCA) to create the database with Oracle-managed files. C、Use Enterprise Manager to create a new database with the Online Transaction Processing (OLTP) option. D、Use Database Configuration Assistant (DBCA) to create the database with Transaction Processing template. E、Use the CREATE DATABASE .. command to create the database with Automatic Storage Management (ASM) file system.

What is the architectural benefit of keeping WebLogic Server transaction log in the database?()A、Oracle does not allow replicating files between data centers, so keeping transaction log in database allows for replication.B、Many transactions in WebLogic are database centric, so keeping log in database makes Two Phase Commit protocol possible.C、It obviates the need to keep in sync two replication technologies (file and database) between  data centers. The single replication technology is used for frequently changing data.D、Transaction log in a file system is extremely slow so it cannot be efficiently replicated.

A user performs an update on a table. Shortly after committing the transaction, they realize that they had an error in their WHERE clause causing the wrong rows to be updated. Which Flashback option would allow you to undo this transaction and restore the table to its previous state?()A、 Flashback DropB、 Flashback QueryC、 Flashback Versions QueryD、 Flashback Transaction QueryE、 Flashback Table

Your company has an existing Windows Communication Foundation (WCF) service that allows business partners to place orders. The service uses netMsmqBinding. You find that processing every order in its own transaction is causing a delay. You need to ensure that the service is configured to process multiple orders in one transaction. What should you do? ()A、Use service behavior and set the maxConcurrentCalls attribute.B、Use endpoint behavior and set the maxBatchSize attribute.C、Use endpoint behavior and set the maxPendingReceives attribute.D、Use endpoint behavior.

A router that performs Network Address Translation (NAT) is installed between your computer and the Internet.  The router fails. You connect the computer directly to the Internet.  You need to ensure that the computer is connected to the Internet in the most secure manner possible.  What should you do?()A、Enable the Remote Desktop feature in the System Properties dialog box.B、Configure the network category of your network connection to Public.C、Configure the network category of your network connection to Private.D、Enable the Windows Collaboration Computer Name Registration Service exception in Microsoft Windows Firewall.

单选题You are a database administrator for your company. The company uses a SQL Server 2005 database. A full backup of the database is made each night. Transaction log backups are made each morning and each afternoon. You notice that the database transaction log file grows very large throughout the day. You need to minimize the size of the transaction log file. You also need to minimize data loss in the event of a failure. What should you do?()ADecrease the amount of time between transaction log backups.BConfigure the database to use the simple recovery model.CConfigure the RECOVERY INTERVAL option to be a smaller value.DRun DBCC SHRINKFILE on the transaction log file.

单选题A carling is used aboard ship().Aas a connecting strap between the butted ends of platingBto stiffen areas under points of great stress between beamsCto prevent the anchor from fouling when the brake is releasedDto provide an extra heavy fitting in a heavy lift cargo rig

单选题While designing the database for one of your online transaction processing (OLTP) applications, you want to achieve the following:  a) high availability of data  b) faster primary key access to the table data  c) compact storage for the table  Which type of tables would you use to achieve these objectives?()A heap tablesB object tablesC partitioned tablesD index-organized tables (IOTs)

单选题While designing the database for one of your online transaction processing (OLTP) applications, you want to achieve the following:  a) high availability of data  b) faster primary key access to the table data  c) compact storage for the table  Which type of tables would you use to achieve these objectives?()Aheap tablesBobject tablesCpartitioned tablesDindex­organized tables (IOTs)

单选题What is the architectural benefit of keeping WebLogic Server transaction log in the database?()AOracle does not allow replicating files between data centers, so keeping transaction log in database allows for replication.BMany transactions in WebLogic are database centric, so keeping log in database makes Two Phase Commit protocol possible.CIt obviates the need to keep in sync two replication technologies (file and database) between  data centers. The single replication technology is used for frequently changing data.DTransaction log in a file system is extremely slow so it cannot be efficiently replicated.

单选题Your system performs heavy transaction processing between 8:00 A.M. and 5:00 P.M. but runs batch processing and reports after that. You decide to create a separate resource plan to govern resource allocation for each time period. Which scheduler object will you use to switch automatically between the two resource plans?()A WindowB ProgramC Job_ClassD Window group

单选题When a system has both online transaction processing as well as large batch processing, which of the following common procedures will best help to improve system performance?()A Boost the priority of batch jobs.B Schedule batch runs to reduce contention with OLTP.C Schedule OS maintenance such that it includes frequent application of PTFs.D Perform incremental backups of transaction processing and full backups of batch processing.

单选题A user performs an update on a table. Shortly after committing the transaction, they realize that they had an error in their WHERE clause causing the wrong rows to be updated. Which Flashback option would allow you to undo this transaction and restore the table to its previous state?()A Flashback DropB Flashback QueryC Flashback Versions QueryD Flashback Transaction QueryE Flashback Table

单选题Your database supports an online transaction processing (OLTP) application. The application is undergoing some major schema changes, such as addition of new indexes and materialized views. You want to check the impact of these changes on workload performance. What should you use to achieve this?()ADatabase replayBSQL Tuning AdvisorCSQL Access AdvisorDSQL Performance AnalyzerEAutomatic Workload Repository compare reports

单选题In which situation would you use the Oracle Shared Server configuration?()Awhen performing export and import using Oracle Data PumpBwhen performing backup and recovery operations using Oracle Recovery ManagerCwhen performing batch processing and bulk loading operation in a data warehouse environment Din an online transaction processing (OLTP) system where large number of client sessions are idle most of the time