单选题Two database users, Jack and Bill, are accessing the Certkiller STAFF table of the Certkiller DB database. When Jack modifies a value in the table, the new value is invisible to Bill. Which is the modified value invisible to Bill?()AThe modified data are not available on disk.BThe modified data have been flushed out from memory.CThe modified rows of the Certkiller STAFF table have been locked.DJack has not committed the changes after modifying the value.EBoth users are accessing the database from two different machines.
单选题
Two database users, Jack and Bill, are accessing the Certkiller STAFF table of the Certkiller DB database. When Jack modifies a value in the table, the new value is invisible to Bill. Which is the modified value invisible to Bill?()
A
The modified data are not available on disk.
B
The modified data have been flushed out from memory.
C
The modified rows of the Certkiller STAFF table have been locked.
D
Jack has not committed the changes after modifying the value.
E
Both users are accessing the database from two different machines.
参考解析
解析:
暂无解析
相关考题:
Jack and Bill are twins, but the former is taller than ________. A.laterB.lateC.latestD.the latter
You Execute the Following command to create a password file in the database server:$ orapwd file = ‘+DATA/PROD/orapwprod entries = 5 ignorecase = N format = 12’Which two statements are true about the password file?()A. It records the usernames and passwords of users when granted the DBA role.B. It contains the usernames and passwords of users for whom auditing is enabled.C. Is used by Oracle to authenticate users for remote database administration.D. It records the usernames and passwords of all users when they are added to the OSDBA or OSOPER operating system groups.E. It supports the SYSBACKUP, SYSDG, and SYSKM system privileges.
You executed this command to create a password file:$ orapwd file = orapworcl entries = 10 ignorecase = NWhich two statements are true about the password file?() A. It will permit the use of uppercase passwords for database users who have been granted the SYSOPER role.B. It contains username and passwords of database users who are members of the OSOPER operating system group.C. It contains usernames and passwords of database users who are members of the OSDBA operating system group.D. It will permit the use of lowercase passwords for database users who have granted the SYSDBA role.E. It will not permit the use of mixed case passwords for the database users who have been granted the SYSDBA role.
You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements:SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT;For which database users is the audit policy now active?()A. All users except SYSB. All users except SCOTTC. All users except sys and SCOTTD. All users except sys, system, and SCOTT
Two database users, Jack and Bill, are accessing the Certkiller STAFF table of the Certkiller DB database. When Jack modifies a value in the table, the new value is invisible to Bill. Which is the modified value invisible to Bill?()A、The modified data are not available on disk.B、The modified data have been flushed out from memory.C、The modified rows of the Certkiller STAFF table have been locked.D、Jack has not committed the changes after modifying the value.E、Both users are accessing the database from two different machines.
You have an Exchange Server 2010 server.You need to prevent users from accessing public folders by using Outlook Web App (OWA).Your solution must not prevent users from accessing public folders by using Office Outlook. Which two actions should you perform?()A、Create a managed folder mailbox policy.B、Modify the properties of the OWA virtual directory.C、Modify the default Outlook Web App Mailbox policy.D、Modify the properties of the public folder database.
You need to design a configuration for Exchange Server storage that meets the business and technical requirements. What should you do?()A、Create a single storage group. Create one database for all usersB、Create two storage groups. In each storage group, create one database. Place mailboxes for remote users in one storage group database, and place all other mailboxes in the other storage group databaseC、Create two storage groups. In each storage group, create one database. Place executive mailboxes in one storage group database, and place all other mailboxes in the other storage group databaseD、Create two storage groups. In one storage group, create a database, and place all mailboxes for remote users and executives in the database. In the other storage group, create a database for all other mailboxes
What are two common reporting requirements?()A、the database connectivity methodB、the number of users in the solutionC、the number of reports being installed D、ability to send completed reports by e-mailE、reporting output available in Microsoft Excel
A customer has a database application that is accessed by a large number of people through a web interface from multiple remote locations. Which of the following questions will provide the information necessary to design the best performing storage solution?()A、How many web servers will be connected to the database?B、Will the database be run on a Windows solution?C、How many concurrent users will be accessing the database?D、What are the types of transactions run against the database?
A junior level Database Administrator erroneously deleted the database alert log while users were accessing the database. Which action should you take to recover the alert log?() A、 Do nothing.B、 Restart the database.C、 Perform recovery on the database.D、 Restore the alert log from the last backup.
You work as a database administrator for Supportcenter.cn. In a production environment, users complain about the slow response time when accessing the database. You have not optimized the memory usage of the Oracle instance and you suspect the problem to be with the memory. To which type of object would you refer to determine the cause of the slow response?()A、The trace fileB、The fixed viewsC、The data dictionary viewsD、The operating system log fieldsE、The dynamic performance views.
View this parameter setting in your database: DB_CREATE_FILE_DEST=’D:// /oracle/product/10.2.0/oradata/oracle’ You created a tablespace by using this command: CREATE TABLESPACE USERS; Which two statements are true about the USERS tablespace?()A、The tablespace has two data files.B、An error is reported and tablespace creation fails.C、Data files are created with names generated by the instance.D、The tablespace can be extended without specifying the data file.E、Data files belonging to the USERS tablespace cannot be renamed.
To accomplish user-managed backup for the USERS tablespace, you issued the following command to put the database in backup mode: SQL ALTER TABLESPACE users BEGIN BACKUP; While copying the file to the backup destination a power outage caused the instance to terminate abnormally. Which statement is true about the next database startup and the USERS tablespace?()A、The database will open, and the tablespace automatically comes out of the backup modeB、The database will be mounted, and recovery must be performed on the USERS tablespace.C、The database will be mounted, and data files in the USERS tablespace must be taken out of the backup mode.D、The database will not be mounted, and you must restore all the data files for the USERS tablespace from the backup, and perform recovery.
You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements: SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM; SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT; For which database users is the audit policy now active?()A、All users except SYSB、All users except SCOTTC、All users except sys and SCOTTD、All users except sys, system, and SCOTT
You have an Exchange Server 2010 organization that contains a mailbox database named DB1.You have a backup of DB1.You need to copy a mailbox from the backup to a personal folder (PST) file.The solution must not prevent users on DB1 from accessing their mailboxes.What should you do?()A、Restore the mailbox database to DB1 and then run the Move-Mailbox cmdlet.B、Restore the mailbox database to DB1 and then restore the mailbox.Run the New- MoveRequest cmdlet.C、Restore the mailbox database to a Recovery Mailbox database and then run the Connect- Mailbox cmdlet.D、Restore the mailbox database to a Recovery Mailbox database and then restore the mailbox.Run the Export-Mailbox cmdlet.
多选题What are two common reporting requirements?()Athe database connectivity methodBthe number of users in the solutionCthe number of reports being installedDability to send completed reports by e-mailEreporting output available in Microsoft Excel
单选题A junior level Database Administrator erroneously deleted the database alert log while users were accessing the database. Which action should you take to recover the alert log?()A Do nothing.B Restart the database.C Perform recovery on the database.D Restore the alert log from the last backup.
多选题You Execute the Following command to create a password file in the database server: $ orapwd file = ‘+DATA/PROD/orapwprod entries = 5 ignorecase = N format = 12’ Which two statements are true about the password file?()AIt records the usernames and passwords of users when granted the DBA role.BIt contains the usernames and passwords of users for whom auditing is enabled.CIs used by Oracle to authenticate users for remote database administration.DIt records the usernames and passwords of all users when they are added to the OSDBA or OSOPER operating system groups.EIt supports the SYSBACKUP, SYSDG, and SYSKM system privileges.
单选题A retail customer has a database application that is accessed by a large number of people through a web interface from multiple remote locations. Which questions will provide the information necessary to design the best performing storage solution of the following?()AHow many web servers will be connected to the database?BHow many concurrent applications will run against the database?CHow many concurrent users will be accessing the database?DWhat are the types of transactions run against the database?
单选题You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. There is a user in the Windows SalesManagers group, and he is called Simon. A Reporting Services report is required by Simon to have annual sales information displayed by territory. There is another user in the Windows Sales group, and he is called Jack. He is responsible to report to Simon. A report is required by Jack, and the report is limited to his sales territory, but the same detailed sales data is still displayed, and the detailed sales data is on Simon’s report. A secure solution should be designed to meet the requirements of the users listed above, and the least amount of server resources should be utilized. Which action should be performed?()AFirst, all territory information should be contained by a parameterized report which is designed for Simon. Second, a linked report that links to Simons report should be designed for Jack.BFirst, two data regions should be contained by a report which is designed for Simon. Second, one data region should be utilized for summary sales data. Third, the other data region should be utilized for the detailed sales data for each sales representative. Four, a report that displays the detailed sales data should be designed for Jack.CFirst, two reports should be designed for Simon. Second, the territory information should be contained by one, and the detailed sales data should be contained by another. At last, a report that displays the detailed sales data for Jack’s territories should be designed for Jack.DFirst, the territory information should be contained by a report which is designed for Simon. Second, a report which detailed sales data for Jack’s territories is contained should be designed for Jack. Third, Simon’s report should be set to have the data in Jacks report contained.
填空题It has been found that the adventurer “Swiftwater” Bill Gates had greatly influenced Jack London’s books.____
单选题Two data files have been deleted at the operating system level by accident. Your database is running in ARCHIVELOG mode and online backups are taken nightly. One of the data files that has been deleted belongs to the USERS tablespace on the other belongs to the SYSTEM tablespace. How can you recover from this situation?()AShut down the database, restore the two data files and then start up the database. BTake the system and users tablespace offline, restore the two data files, recover the two datafiles, and then bring the SYSTEM and USERS tablespaces online. CShut down the database, restore the two data files, start up the database in MOUNT mode, recover the two data files, and then alter the database open. DTake the SYSTEM and USERS tablespaces offline, recover the two datafiles and then bring the SYSTEM and USERS tablespaces online.
多选题You work as a database administrator for Supportcenter.cn. Users in the SupportCenter PROD database complain about the slow response when accessing the database. In the Active Session Waiting: Configuration page you find that the majority of the wait time is for the redo log buffer. Further investigation using the Run Queue graph and operating system tools reveals that the redo log files are on the same disks, and that the disk I/O for the redo log files is the reason for the performance degradation. Which two actions would you take to gain performance?()AIncrease the size of redo log filesBIncrease the size of redo log bufferCIncrease the number of redo log filesDPlace the redo log files on a separate diskEDecrease the number of redo log groups to twoFIncreate the number Log Writer (LGWR) process
多选题You executed this command to create a password file: $ orapwd file = orapworcl entries = 10 ignorecase = N Which two statements are true about the password file?()AIt will permit the use of uppercase passwords for database users who have been granted the SYSOPER role.BIt contains username and passwords of database users who are members of the OSOPER operating system group.CIt contains usernames and passwords of database users who are members of the OSDBA operating system group.DIt will permit the use of lowercase passwords for database users who have granted the SYSDBA role.EIt will not permit the use of mixed case passwords for the database users who have been granted the SYSDBA role.
单选题Your database is in ARCHIVELOG mode. On Friday evening, you perform an online database backup by using the BACKUP DATABASE command at the Recovery Manager (RMAN) prompt and close the database. On Monday, the System Administrator informs you about the failure of two hard disks. One of the lost disks contains two datafiles, HR1.DBF and HR2.DBF, both of which belong to a read/write tablespace named HR. The disk also contains a datafile, USERS.DBF, which belongs to a read/write tablespace named USERS. You need to restore and recover the database backup that was performed on Friday evening. After mounting the database, you issue the following RMAN commands: RMANRESTORE DATABASE; RMANRECOVER DATABASE; After successfully executing these RMAN commands, you issue the following statement using SQL*Plus: SQLALTER DATABASE OPEN; You receive the following errors when attempting to open the database: ORA-01157: cannot identify/lock data file 10 see DBWR trace file ORA-01110: data file 10: ’D:///USERS.DBF’ What is the cause of these errors?()A The USERS.DBF datafile is corrupted and cannot be restored by RMAN.B The USERS.DBF datafile was not backed up using the RMAN BACKUP DATABASE command.C The USERS.DBF datafile was not restored using the RMAN RESTORE DATABASE command.D The USERS.DBF datafile was not recovered using the RMAN RECOVER DATABASE command.
单选题Bill can inspect a case of cell phones in 6 hours. Jack can inspect the same case of cell Phones in 4 hours. After working alone for l hour, Bill stops for lunch. After taking a 30-minute lunch break. Bill and Jack work together to inspect the remaining cell phones. How long do Bill and Jack work together to complete the job?A1 hr. and l2 minB1 hr. and 24 minC2 hrsD2 hrs and lo minE2 hrs and 20 min
单选题You work as a database administrator for Supportcenter.cn. In a production environment, users complain about the slow response time when accessing the database. You have not optimized the memory usage of the Oracle instance and you suspect the problem to be with the memory. To which type of object would you refer to determine the cause of the slow response?()AThe trace fileBThe fixed viewsCThe data dictionary viewsDThe operating system log fieldsEThe dynamic performance views.
单选题Two database users, Jack and Bill, are accessing the SupportCenter STAFF table of the SupportCenter DB database. When Jack modifies a value in the table, the new value is invisible to Bill. Which is the modified value invisible to Bill?()AThe modified data are not available on disk.BThe modified data have been flushed out from memory.CThe modified rows of the SupportCenter STAFF table have been locked.DJack has not committed the changes after modifying the value.EBoth users are accessing the database from two different machines.