单选题Given below is a list of scenarios:  1)A user terminates his session abnormally.  2)The connection between the server and the client application terminates because of a network failure.  3)A schema is accidentally dropped.  4)The tablespace is accidentally dropped from the database.  5)The hard disk gets corrupted and the data files in the disk are lost.  6)The database instance abnormally shuts down because of power failure.  Which scenarios require DBA intervention to perform recovery()A4 and 5B1,3,and 6C4,5,and 6D3,4,and 5E1,2,and 6

单选题
Given below is a list of scenarios:  1)A user terminates his session abnormally.  2)The connection between the server and the client application terminates because of a network failure.  3)A schema is accidentally dropped.  4)The tablespace is accidentally dropped from the database.  5)The hard disk gets corrupted and the data files in the disk are lost.  6)The database instance abnormally shuts down because of power failure.  Which scenarios require DBA intervention to perform recovery()
A

4 and 5

B

1,3,and 6

C

4,5,and 6

D

3,4,and 5

E

1,2,and 6


参考解析

解析: 暂无解析

相关考题:

多选题Which  statements are true about checkpointing()AThe checkpoint frequency decreases with the smaller redo log file size.BIt ensures that all committed data is written to the data files during normal shutdown.CThe frequent full checkpoint in a database can cause the overall degradation of the database performance.DIt prompts the Checkpoint (CKPT) process to write data to the data files and redo information to the onlineredo log files

单选题The database instance has the following parameter setting: OS_AUTHENT_PREFIX = OPS$ OS_ROLES = FALSE  REMOTE_OS_AUTHENT = FALSE REMOTE_OS_ROLES = FALSE TIMED_OS_STATISTICS = 0  You have a local operating system user SKD. You create a database user OPS$SKD, and then  assignexternal authentication. The user OPS$SKD has the CREATE SESSION privilege.  What would youachieve by the above process()AThe database user OPS$SKD will be able to administer the database.BThe authentication detail for the database user OPS$SKD is recorded in the password file.CThe local operating system user SKD will be able to access the database instance without specifying the username and password.DThe database user OPS$SKD has to login with the password of the local operating system user SKD to access the database instance.

单选题Identify the logical structure that will never have more than one data segment created for it.()Aexternal tableBpartitioned tableCpartitioned indexDnonclustered tableEglobal temporary table

单选题In your database instance, the user sessions are connected to the database server from the remotemachines. You want to achieve the following for these users:  1:The user account must be locked after four unsuccessful login attempts.PASSWORD_LOCK_TIME  2:The user must be prompted to change the password at regular intervals.PASSWORD_LIFE_TIME  3:The user may not have more than three simultaneous sessions.SESSIONS_PER_USER  4:The user session must automatically be logged off if more than 10 minutes elapsed time used.CONNECT_TIME  How would you accomplish the above()Aby assigning profiles for the usersBby implementing Fine-Grained Auditing (FGA)Cby granting a secure application role to the usersDby implementing the Database Resource Manager plan

单选题Observe the information in the columns: 1. The SGA                 a. Text and parsed forms of all SQL statements 2. The cursor state       b. Run-time memory values for the SQL statement, such as rows retrieved 3. User-session data    c. Security and resource usage information 4. The stack space      d. Local variables for the process  Which option has the correct match between the memory areas and their contents()A1-c, 2-b, 3-d, 4-aB1-b, 2-c, 3-d, 4-aC1-a, 2-b, 3-c, 4-dD1-a, 2-b, 3-d, 4-c

多选题In which of the scenarios will the DBA perform recovery()AThe alert log file is corrupted.BA tablespace is accidentally dropped.COne of the redo log members is corrupted.DA database user terminates the session abnormally.EThe hard disk on which the data file is stored is corrupted.

多选题Which two statements are true about the Automatic Database Diagnostic Monitor (ADDM)()AThe ADDM requires at least four AWR snapshots for analysis.BThe ADDM runs after each AWR snapshot is collected automatically by MMON.CThe results of the ADDM analysis are stored in the Automatic Workload Repository (AWR).DThe ADDM analysis provides only diagnostic information but does not provide recommendations.EThe ADDM calls other advisors if required, but does not provide recommendations about the advisors.

单选题Which statement is true about loading data using the conventional path of SQL*Loader()ARedo is not generated while performing conventional path loads.BOnly PRIMARY KEY, UNIQUE KEY, and NOT NULL constraints are checked.CNo exclusive locks are acquired when the conventional path loads are performed.DInstead of performing transactions, SQL*Loader directly writes data blocks to the data files.EINSERT triggers are disabled before the conventional path load and reenabled at the end of the load

单选题Which task would you perform before you run Oracle Universal Installer (OUI) in silent or suppressedmode for an installation()ARun the root.sh script.BCreate the oraInst.loc file.CCreate the tnsnames.ora file.DRun the oraintRoot.sh script.