Examine the command: SQL DBMS_STATS.SET_TABLE_PREFS(’SH’, ’CUSTOMERS’, ’PUBLISH’, ’false’);  Which statementdescribes the effect of the above command()A、Automatic statistics collection is stopped for the CUSTOMERS table.B、Statistics for the CUSTOMERS table are locked and cannot be overwritten.C、Existing statistics for the CUSTOMERS table become unusable for the query optimizer.D、Subsequently, statistics gathered on the CUSTOMERS table are stored as pending statistics

Examine the command: SQL> DBMS_STATS.SET_TABLE_PREFS(’SH’, ’CUSTOMERS’, ’PUBLISH’, ’false’);  Which statementdescribes the effect of the above command()

  • A、Automatic statistics collection is stopped for the CUSTOMERS table.
  • B、Statistics for the CUSTOMERS table are locked and cannot be overwritten.
  • C、Existing statistics for the CUSTOMERS table become unusable for the query optimizer.
  • D、Subsequently, statistics gathered on the CUSTOMERS table are stored as pending statistics

相关考题:

You are the administrator of a Windows Server 2003 computer named Server1. The hardware vendor forServer1 notifies you that a critical hotfix is available. This hotfix is required for all models of this computer thathave a certain network interface card.You need to find out if the network interface card that requires the hotfix is installed in Server1.What are two possible ways to achieve this goal? ()(Each correct answer presents a complete solution. Choose two.)A. Open Network Connections, and then examine the properties of each connection that is listed.B. Open the Component Services snap-in, expand Computers, expand My Computer, and then examine the list.C. Run the netsh interface command, and then examine the list.D. Open Device Manager, expand Network adapters, and then examine the list

Examine the following RMAN command:RMAN CONFIGURE ENCRYPTION FOR DATABASE ON;RMAN BACKUP DATABASE PLUS ARCHIVELOG;Which prerequisite must be met before accomplishing the backup?() A. Provide a password for the encryptionB. Set up an Oracle wallet for the encryptionC. No setup is required as it is a default encryption methodD. Both Oracle wallet and password must be set up for the encryption

View the Exhibit and examine the output.You execute the following RMAN command to perform the backup operation:What is the multiplexing level in the preceding backup process() A. 4B. 8C. 7D. 0

View the Exhibit to examine the error while executing the REPAIR FAILURE command in an RMAN session.What is the reason for this error?() A. Another repair session is running concurrently.B. The failure ID has not been mentioned in the command for data file 5.C. There are new failures recorded in the Automatic Diagnostic Repository (ADR).D. The ADVISE FAILURE command has not been issued before the REPAIR FAILURE command.

Examine the output of the query that you executed to list the objects in the recycle bin:You verified that no table named SALES_TAB exists in the schema. Then you executed the following command to purge the objects in the recycle bin:SQL PURGE TABLE sales_tab;What would be the outcome of this command?()A. All three tables in the recycle bin are purgedB. Only the table with the oldest DROPSCN is purgedC. The command returns an error because multiple entries with the same name exist in the recycle binD. Only the table with the latest DROPSCN is purged

View the Exhibit to examine the error during the database startup.You open an RMAN session for the database instance. To repair the failure, you executed the following as the first command in the RMAN session:RMAN REPAIR FAILURE;Which statement describes the consequence of the command?()A. The command performs the recovery and closes the failures.B. The command only displays the advice and the RMAN script required for repair.C. The command produces an error because the ADVISE FAILURE command has not been executed before the REPAIR FAILURE command.D. The command executes the RMAN script to repair the failure and removes the entry from the Automatic Diagnostic Repository (ADR).

After adding a new Ethernet card to a system and rebooting, the system administrator notices the card was not configured. How can the system administrator determine if there were errors during the configuration process for the card?()A、Examine the bootlog with the command: alog -o -f /var/adm/ras/bootlogB、Display the device attributes and errors with the command: lsdev -C -l ent0C、Examine the AIX errlog for configuration method errors with the command: errpt -a -C ent0D、Examine the ODM for configuration errors with the command: odmget -q "method_errors" ent0

Which three statements are true about Cisco IOS Firewall?()A、It can be configured to block Java traffic.B、It can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.C、It can only examine network layer and transport layer information.D、It can only examine transport layer and application layer information.E、The inspection rules can be used to set timeout values for specified protocols.F、The ip inspect cbac-name command must be configured in global configuration mode.

Examine the following RMAN command:   RMAN CONFIGURE ENCRYPTION FOR DATABASE ON; RMAN BACKUP DATABASE PLUS ARCHIVELOG;   Which prerequisite must be met before accomplishing the backup?()A、 Provide a password for the encryptionB、 Set up an Oracle wallet for the encryptionC、 No setup is required as it is a default encryption methodD、 Both Oracle wallet and password must be set up for the encryption

You have a computer that runs Windows 7. You configure the computer to automatically install all updates.You need to verify whether a specific update is installed.  What should you do?()A、In Event Viewer, examine the Application log.B、In Windows Update, examine the update history.C、At the command prompt, run Wusa.exe and specify the /kb parameter.D、At the command prompt, run Verifier.exe and specify the /query parameter.

You are the network administrator for You administer a Windows Server 2003 computer named TestKing5. The hardware vendor for TestKing5 notifies you that a critical hotfix is available. This hotfix is required for all models of this computer that have a certain network interface card. You need to find out if the network interface card that requires the hotfix is installed in TestKing5. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)()A、Open Network Connections, and then examine the properties of each connection that is listed.B、Open the Component Services snap-in, expand Computers, expand My Computer, and then examine the list.C、Run the netsh interface command, and then examine the list.D、Open Device Manager, expand Network adapters, and then examine the list.

单选题View the Exhibit and examine the structure of the EMP table. You executed the following command to add a primary key to the EMP table:   ALTER TABLE emp   ADD CONSTRAINT emp_id_pk  PRIMARY KEY (emp_id)   USING INDEX emp_id_idx;   Which statement is true regarding the effect of the command?()A  The PRIMARY KEY is created along with a new index.B  The PRIMARY KEY is created and it would use an existing unique index.C  The PRIMARY KEY would be created in a disabled state because it is using an existing index.D  The statement produces an error because the USING clause is permitted only in the CREATE TABLE command.

单选题Examine the following RMAN command: RMAN CONFIGURE ENCRYPTION FOR DATABASE ON; RMAN BACKUP DATABASE PLUS ARCHIVELOG; Which prerequisite must be met before accomplishing the backup?()AProvide a password for the encryptionBSet up an Oracle wallet for the encryptionCNo setup is required as it is a default encryption methodDBoth Oracle wallet and password must be set up for the encryption

单选题View the Exhibit and examine the parameters. User A executes the following command to update the TRANS table: SQL UPDATE B.trans SET tr_amt=tr_amt+500 WHERE c_code=’C005’;  Before user A issues a COMMIT or ROLLBACK command, user B executes the following command onthe TRANS table:  SQL ALTER TABLE trans MODIFY (tr_type VARCHAR2(3));  What would happen in this scenario()A The ALTER TABLE command modifies the column successfully.B The DDL operation gets higher priority and transaction for user a is rolled back.C The ALTER TABLE command waits indefinitely until user a ends the transaction.D The ALTER TABLE command fails after waiting for 60 seconds due to the resource being busy.

单选题To examine the Exhibit, press the Exhibit button. Which option would produce this output from the errpt command? ()A  errpt -t B  errpt -a C  errpt -D D  errpt

单选题Examine the command: SQL DBMS_STATS.SET_TABLE_PREFS(’SH’, ’CUSTOMERS’, ’PUBLISH’, ’false’);  Which statementdescribes the effect of the above command()AAutomatic statistics collection is stopped for the CUSTOMERS table.BStatistics for the CUSTOMERS table are locked and cannot be overwritten.CExisting statistics for the CUSTOMERS table become unusable for the query optimizer.DSubsequently, statistics gathered on the CUSTOMERS table are stored as pending statistics

多选题Examine the command: SQL ALTER USER skd ACCOUNT LOCK; Which two statements are true after the command is executed()AThe SKD user cannot log in to the database instance.BThe objects owned by the SKD user are not accessible to any user.CThe other users can access the objects owned by the SKD user, on which they have access.DThe password for the SKD user expires and the user is forced to change the password at the next log in

单选题Examine the command:  SQL DBMS_STATS.SET_TABLE_PREFS(’SH’, ’CUSTOMERS’, ’PUBLISH’, ’false’); Which statement describes the effect of the above command()AAutomatic statistics collection is stopped for the CUSTOMERS table.BStatistics for the CUSTOMERS table are locked and cannot be overwritten.CExisting statistics for the CUSTOMERS table become unusable for the query optimizer.DSubsequently, statistics gathered on the CUSTOMERS table are stored as pending statistics.

单选题Your multitenant container database (CDB) is running in ARCHIVELOG mode. You connect to the CDB RMAN. Examine the following command and its output: You execute the following command: RMAN BACKUP DATABASE PLUS ARCHIVELOG; Which data files will be backed up?()AData files that belong to only the root containerBData files that belong to the root container and all the pluggable databases (PDBs)CData files that belong to only the root container and PDB$SEEDDData files that belong to the root container and all the PDBs excluding PDB$SEED

单选题Examine the following command:   SQL ALTER TABLE booking SHRINK SPACE COMPACT;   Which activity is performed when the preceding command is executed?()A The shrink operation touches every block in the BOOKING tableB The high-water mark (HWM) for the BOOKING table is shifted from its original positionC The progress of the shrink operation is saved in the bitmap blocks of the BOOKING tableD The data manipulation language (DML) triggers on the BOOKING table are executed because the shrink operation is internally handled by the INSERT/DELETE operation

单选题You have a computer that runs Windows 7. You configure the computer to automatically install all updates.You need to verify whether a specific update is installed.  What should you do?()AIn Event Viewer, examine the Application log.BIn Windows Update, examine the update history.CAt the command prompt, run Wusa.exe and specify the /kb parameter.DAt the command prompt, run Verifier.exe and specify the /query parameter.

单选题Examine the following command:   ALTER DISKGROUP data MOUNT FORCE;   In which scenario can you use the above command to mount the disk group?()A when ASM disk goes offlineB when one or more ASM files are droppedC when some disks in a disk group are offlineD when some disks in a failure group for a disk group are rebalancing

单选题Examine the following command: ALTER DISKGROUP data MOUNT FORCE; In which scenario can you use the above command to mount the disk group? ()Awhen ASM disk goes offlineBwhen one or more ASM files are droppedCwhen some disks in a disk group are offlineDwhen some disks in a failure group for a disk group are rebalancing