多选题In your production database, you observe that users’ transactions are consuming a lot of resources and you plan to impose resource restrictions by using Resource Manager. For which three resources can you enable usage restrictions by using Resource Manager? ()ACPU usageBdegree of parallelismCnumber of open cursorsDnumber of sorts performedEidle time for blocking sessionsFnumber of disk I/O operations performedGnumber of memory I/O operations performed

多选题
In your production database, you observe that users’ transactions are consuming a lot of resources and you plan to impose resource restrictions by using Resource Manager. For which three resources can you enable usage restrictions by using Resource Manager? ()
A

CPU usage

B

degree of parallelism

C

number of open cursors

D

number of sorts performed

E

idle time for blocking sessions

F

number of disk I/O operations performed

G

number of memory I/O operations performed


参考解析

解析: 暂无解析

相关考题:

You are using Recovery Manager (RMAN) with a recovery catalog to back up your production database. The backups and the archived redo log files are copied to a tape drive on a daily basis. Because of media failure, you lost your production database completely along with the recovery catalog database. You want to recover the target database and make it functional. You consider performing the following steps to accomplish the task:Which option illustrates the correct sequence that you must use?()A. 8, 1, 3, 2, 4, 5, 7, 6B. 1, 8, 3, 4, 2, 5, 7, 6C. 1, 3, 4, 2, 8, 5, 6, 7D. 1, 3, 2, 4, 6, 5, 7, 8

You realize that the control file is damaged in your production database.After restoring the control file from autobackup, what is the next step that you must do to proceed with the database recovery?()A. Mount the databaseB. Open the database in NORMAL modeC. Open the database in RESTRICTED modeD. Open the database with the RESETLOGS option

You are using a recovery catalog to maintain Recovery Manager (RMAN) backup information for yourproduction database. You have registered your production database and are performing regular backups.Because of a new requirement you have added a few new tablespaces to your production database and youwant them to be included in backups.Identify two options for completing this task. ()(Choose two.)A. Reregistering the target database in recovery catalogB. Transporting the new tablespaces to the recovery catalog databaseC. Syncronizing the recovery catalog with the target database control fileD. Performing a fresh backup of the target database to include the new data files in the catalog database

You are maintaining your production database in Oracle10g. You want the circular reuse records in the control file of the target database to be reused as required.   Which value will you set for the CONTROL_FILE_RECORD_KEEP_TIME initialization parameter?()A、 0B、 1C、 NONED、 DEFAULT

You realize that the control file is damaged in your production database.After restoring the control file from autobackup, what is the next step that you must do to proceed with the database recovery?()A、Mount the databaseB、Open the database in NORMAL modeC、Open the database in RESTRICTED modeD、Open the database with the RESETLOGS option

Your production database uses an Automatic Storage Management (ASM) instance to manage its files.  You want to add a new disk group to the ASM instance to manage the increased data load.  What action would you perform to include the new disk group in the ASM instance without causing any impact on the currently connected users?()A、mount the new disk group in the ASM instanceB、restart the ASM instance and the production database instanceC、register the new disk groups in the production database instanceD、restart the ASM instance without restarting the production database instanceE、include the new disk group in the ASM_DISKSTRING parameter in the parameter file and restart the ASM instance

You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()A、functionsB、packagesC、proceduresD、database triggersE、anonymous PL/SQL block

You work as a database administrator at Certkiller .com. In your production database there is a job, CALC_STAT, which has been scheduled to run every Friday at 5.00 p.m. CALC_STATupdates the optimizer statistics for the objects owned by the APPSschema. You want the task to be generic, thereby allowing users to modify the attributes of the task at run time without affecting the original task.Which component of Oracle Scheduler must you define to achieve this?()A、 WindowB、 ProgramC、 Job classD、 Window group

In your production database, you observe that users’ transactions are consuming a lot of resources and you plan to impose resource restrictions by using Resource Manager.  For which three resources can you enable usage restrictions by using Resource Manager?()A、CPU usageB、degree of parallelismC、number of open cursorsD、number of sorts performedE、idle time for blocking sessionsF、number of disk I/O operations performedG、number of memory I/O operations performed

You work as a database administrator for Supportcenter.cn. In your production database, the size of Database Buffer Cache needs to be increased immediately for the current as well as future instances of the database. The Oracle instance has been configured to accommodate any changes in the size of the memory structures. At this is production database, you want to accomplish this task with no impact on the user’s connections. Which activity must you have completed before accomplishing this task?()A、You must have started the database instance in restricted mode.B、You must have started the database instance inNORMALmode.C、You must have started the database instance with server parameter file.D、You must have started the database instance but must not have mounted.E、You must have started the database instance but must not have opened.

单选题There is a problem with one of the disks used for your database and your system administrator informs you that the disk needs to be replaced. The replacement disk will not be available until tomorrow.  There was only one data file on this disk; it belongs to the USERS tablespace in your PROD database. Your PROD database runs in ARCHIVELOG mode and nightly online backups are taken. The users need to be able to access the data in the USERS tablespace before the replacement disk arrives. You have already taken the USERS tablespace offline and have restored the data file from last night’s backup to a new disk. Which additional steps are required in order to make the USERS tablespace available?()AOnly bring the tablespace back online.BOnly recover the tablespace and then bring the tablespace back online.CShut down the database, recover the data file and then start up the database.DIssue the ALTER DATABASE RENAME FILE command, recover the tablespace, and then bring the tablespace online.ERecover the tablespace, issue the ALTER DATABASE RENAME FILE command, and then bring the tablespace online.

单选题You are about to create your Oracle data dictionary for use with the database. Which of the following users would you connect to the database as for this purpose in Oracle9i and later releases?()ASYSTEM BOUTLN CINTERNAL DSYS

多选题You are using a recovery catalog to maintain Recovery Manager (RMAN) backup information for yourproduction database. You have registered your production database and are performing regular backups. Because of a new requirement you have added a few new tablespaces to your production database and youwant them to be included in backups.Identify two options for completing this task. ()(Choose two.)AReregistering the target database in recovery catalogBTransporting the new tablespaces to the recovery catalog databaseCSyncronizing the recovery catalog with the target database control fileDPerforming a fresh backup of the target database to include the new data files in the catalog database

单选题You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()AfunctionsBpackagesCproceduresDdatabase triggersEanonymous PL/SQL block

单选题You work as a database administrator at Certkiller .com. Your production database uses an Automatic Storage Management (ASM) instance to manage its files. You want to add a new disk group to the ASM instance to manage the increased data load. What action would you perform to include the new disk group in the ASM instance without causing any impact on the currently connected users?()A mount the new disk group in the ASM instanceB restart the ASM instance and the production database instanceC register the new disk groups in the production database instanceD restart the ASM instance without restarting the production database instanceE include the new disk group in the ASM_DISKSTRING parameter in the parameter file and restart the ASM instance

单选题Your production database uses an Automatic Storage Management (ASM) instance to manage its files. You want to add a new disk group to the ASM instance to manage the increased data load. What action would you perform to include the new disk group in the ASM instance without causing any impact on the currently connected users?()Amount the new disk group in the ASM instanceBrestart the ASM instance and the production database instanceCregister the new disk groups in the production database instanceDrestart the ASM instance without restarting the production database instanceEinclude the new disk group in the ASM_DISKSTRING parameter in the parameter file and restart the ASM instance

单选题You are using recovery Manager (RMAN) with a recovery catalog to backup up your production database. The backups and the archived redo log files are copied to a tape drive on a daily basis. The database was open and transactions were recorded in the redo logs. Because of fire in the building you lost your servers having the production database and the recovery catalog database. The archive log files generated after the last backup are intact on one of the remote locations. While performing a disaster recovery of the production database what is the next step that you must perform after restoring the data files and applying archived redo logs?()AOpen the database in NORMAL modeBOpen the database in read-only modeCOpen the database in RESTRICTED modeDOpen the database with the RESETLOGS option

单选题In your Certkiller .com production database, you find that the database users are able to create and read files with unstructured data, available in any location on the host machine from an application.  You want to restrict the database users to access files in a specific location on the host machine.  What could do to achieve this?()AModify the value for the UTL_FILE_DIR parameter in the parameter fileBGrant read and write privilege on the operating system path to the database usersCModify the value for the LDAP_DIRECTORY_ACCESS parameter in the parameter fileDModify the value for the PLSQL_NATIVE_LIBRARY_DIR parameter in the parameter fileECreate a directory object referring to the operating system path, and grant read and write privilege on the directory object to the database users

多选题In your production database, you observe that users’ transactions are consuming a lot of resources and you plan to impose resource restrictions by using Resource Manager. For which three resources can you enable usage restrictions by using Resource Manager? ()ACPU usageBdegree of parallelismCnumber of open cursorsDnumber of sorts performedEidle time for blocking sessionsFnumber of disk I/O operations performedGnumber of memory I/O operations performed

单选题In Recovery Manager (RMAN), you are taking image copies of the data files of your production database and rolling them forward at regular intervals. You attempt to restart your database. After a regular maintenance task, you realize that one of the data files that belongs to the USERS tablespace is damaged and you need to recover the data file by using the image copy. Because a media failure caused the data file to be damaged, you want to place the data file in a different location while restoring the file. Which option must you consider for this task?()Ausing only the RMAN SWITCH command to set the new location for the data fileBplacing the database in the MOUNT state for the restore and recovery operations.Cusing an RMAN RUN block with the SET NEWNAME and then the SWITCH command.Dconfiguring two channels: one for the restore operation and the other for the recovery operation

单选题You work as a database administrator at Certkiller .com. In your production database there is a job, CALC_STAT, which has been scheduled to run every Friday at 5.00 p.m. CALC_STATupdates the optimizer statistics for the objects owned by the APPSschema. You want the task to be generic, thereby allowing users to modify the attributes of the task at run time without affecting the original task.Which component of Oracle Scheduler must you define to achieve this?()A WindowB ProgramC Job classD Window group

多选题You work as a database administrator at Certkiller .com. In your production database, you observe that users’ transactions are consuming a lot of resource and you plan to impose resource restrictions by using Resource Manager. For which three resources can you enable usage restrictions by using Resource Manager? ()ACPU usageBdegree of parallelismCnumber of open cursorsDnumber of sorts performedEidle time for blocking sessionsFnumber of disk I/O operations performedGnumber of memory I/O operations performed

多选题You are using a recovery catalog to maintain Recovery Manager (RMAN) backup information for your production database. You have registered your production database and are performing regular backups. Because of a new requirement you have added a few new tablespaces to your production database and you want them to be included in backups.  Identify two options for completing this task.()AReregistering the target database in recovery catalogBTransporting the new tablespaces to the recovery catalog databaseCSyncronizing the recovery catalog with the target database control fileDPerforming a fresh backup of the target database to include the new data files in the catalog database