You have applications that have frequently executed queries, and produce small and static result sets.  You configure the sqlnet.ora file in the client machine to set a nonzero value for the OCI_RESULT_CACHE_MAX_SIZE parameter.  What is the purpose of this configuration?()  A、 to avoid round trips to the server by enabling caching of query results in client memoryB、 to improve performance by storing a copy of the data from the private SQL area of the PGAC、 to enhance the query performance by creating a cache in the client memory for sorting operationsD、 to avoid the storing of query plans and results in the server by creating a cache in the client memory

You have applications that have frequently executed queries, and produce small and static result sets.  You configure the sqlnet.ora file in the client machine to set a nonzero value for the OCI_RESULT_CACHE_MAX_SIZE parameter.  What is the purpose of this configuration?()  

  • A、 to avoid round trips to the server by enabling caching of query results in client memory
  • B、 to improve performance by storing a copy of the data from the private SQL area of the PGA
  • C、 to enhance the query performance by creating a cache in the client memory for sorting operations
  • D、 to avoid the storing of query plans and results in the server by creating a cache in the client memory

相关考题:

What would you tell the interviewer that you are such a candidate who can adjust yourself to changes quickly?A.About what new things or skills you have been learning at the moment.B.About what changes you encountered before and how you responded.C.About how smart enough you are to be able to stop adverse situations getting worse.D.About how interested you are in some new technologies, methods and applications in your study.

You have a computer that runs Windows Vista.You need to ensure that all local administrators can install applications without being prompted for approval.What should you do?() A.AB.BC.CD.D

Write a memo in about 50 words. You are the Personnel Manager of a company, and have been approached by your IT Department to recruit three new members of staff. Write a memo to Miss Kate Bush, the Manager of the IT Department, ·informing her you have received over 100 applications and have selected 10 candidates for interview, ·telling her you will write to the candidates inviting them for interview, and ·asking her to tell you the time and the place of the interview.

You replaced your Layer 3 switch, which is the default gateway of the end users. Many users cannot access anything now, including email, Internet, and other applications, although other users do not have any issues. All of the applications are hosted in an outsourced data center. In order to fix the problem, which one of these actions should you take?()A、Clear the MAC address table in the switch.B、Clear the ARP cache in the switch.C、Clear the ARP cache in the end devices.D、Clear the ARP cache in the application servers.

You are working with a client to classify the different types of application traffic they will have on their network and to assign a QoS value to each traffic flow. The client has identified the following applications: Internet traffic, Oracle, network-based backups, AOL Instant Messenger, IP routing, voice, and voice signaling. Given these types of applications, how many different classes will need to be configured in QoS?()A、8B、6C、9D、5

You are the Database Administrator for WonderWeb, which has recently acquired a media company TXGlobal. You have been assigned the task to migrate all the database applications of TXGlobal to the database server of WonderWeb. To accommodate more database applications, you need to add disks to the existing disk group. Whenever you add or remove disks from the disk group, Automatic Storage Management (ASM) rebalancing distributes the data evenly across all the disks of the disk group. Which background process performs this actual rebalancing activity, resulting in the movement of data extents in the disk groups?()  A、 ASMBB、 ARBnC、 RBAL in the ASM instanceD、 RBAL in the database instance

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. The instance has databases for a finance application and a manufacturing application. You want to put some limitation on the maximum CPU query time allowed by the applications, so you configure the Resource Governor to achieve this. But you notice that certain reports do not execute successfully any longer on the manufacturing application. You have to allow the manufacturing application to consume more CPU time, so you have to change the Resource Governor configuration.  Which Resource Governor component should you configure?()  A、The workload group which is used by default B、The workload group which is used by the finance application C、The classifier function which identifies the finance application D、The workload group which is used by the manufacturing application

Your network contains a single Active Directory domain. You have 100 servers that run Windows   Server 2008 R2 and 5,000 client computers that run Windows 7.  You plan to deploy applications to the client computers.   You need to recommend an application deployment strategy that meets the following requirements:   èApplications must be deployed only to client computers that meet the minimum hardware requirements.   èDeployments must be scheduled to occur outside business hours.   èDetailed reports on the success or failure of the application deployments must be provided.   What should you recommend?()A、Deploy applications by using Group Policy.B、Implement Windows Server Update Services (WSUS).C、Implement Microsoft System Center Operations Manager (SCOM) 2007 R2.D、Implement Microsoft System Center Configuration Manager (SCCM) 2007 R2.

You have a single Active Directory directory service domain. All servers run Windows Server 2003. You need to specify the list of applications that users are permitted to run. You create a new Group Policy object (GPO) and link it to the domain.  What should you do next?()A、 Configure Software Restriction Policies Group Policy settings.B、 Configure the Enable user control over installs Group Policy setting.C、 Assign all approved applications.D、 Publish all approved applications.

Your network consists of a single Active Directory forest. You have 50 portable computers and 50 desktopcomputers. All computers have 32-bit hardware. You plan to deploy Windows 7 and 10 corporateapplications to the computers by using a custom image. You need to prepare for the deployment by usingthe minimum amount of administrative effort.  What should you do first?()A、On one computer, install Windows 7 and the corporate applications.B、On one portable computer and one desktop computer, install Windows 7 and the corporate applications.C、On a server, install and run the Microsoft Assessment and Planning (MAP) Toolkit.D、On a server, install the Windows Automated Installation Kit (AIK) and run Windows System ImageManager (Windows SIM).

You have a single Active Directory directory service domain. You use Group Policy to assign applications. A computer named Desktop1 must be moved to a different organizational unit (OU). Youneed to ascertain the effect that the move will have on the applications that are assigned to the computer account.  What should you do?()A、 Use the RSoP tool in logging mode on Desktop1.B、 Use the RSoP tool in planning mode on Desktop1.C、 Use the RSoP tool in logging mode on a domain controller.D、 Use the RSoP tool in planning mode on a domain controller.

You are an administrator at Cer-tech .com. You have been instructed to install Web Server (IIS) on a newWindows Server 2008 server. After installing IIS, you install Microsoft .NET framework 1.0 application on awebsite hosted on the server. You also have to make sure that all applications must run on a minimum level of permission according to the company security policy. You should configure the website applicationto have permissions to execute without creating other content or accessing Windows Server 2008 system components. What should you do to achieve this task?()A、Configure the .NET Framework website trust level to lowB、Configure the .NET Framework website trust level to HighC、Configure the .NET Framework website trust level to FullD、Configure the .NET Framework website trust level to MediumE、Configure the .NET Framework website trust level to Optimal

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Today you notice that applications that run on the server have poor performances. You doubt that this has something to do with table scans. You have to capture the appropriate information by using an appropriate Windows System Monitor object. In the options below, which performance object should you use? () A、You should use SQLServer:Buffer ManagerB、You should use SQLServer:Memory Manager C、You should use SQLServer:Databases D、You should use SQLServer:Access Methods

Client computers on your network run either Windows Vista or Windows 7.  You plan to use Microsoft Application Virtualization (App-V) 4.5 with SP1 as an application virtualization platform. You need to virtualize applications by using mount point installations (MNT).  What should you do?()A、Configure the App-V Sequencer to have two partitionsB、Configure the App-V Sequencer on a Windows 7 client computerC、Configure virtualized applications to check for updates during installationD、On the reference computer, install all software that typically runs on client computers

You work as the application developer at Certkiller .com. Certkiller .com uses Visual Studio.NET 2005 as its application development platform.You have recently finished development of a class named TestReward and package the class in a .NET 2.0 assembly named TestObj.dll. After you ship the assembly and it is used by client applications, you decide to move the TestReward class from TestObj.dll assembly to the TestRewardObj.dll Assembly. You are to ensure when you ship the updated TestObj.dll and TestRewardObj.dll assemblies that the client applications continue to work and do not require recompiling.What should you do?()A、 The TypeForwardedTo attribute should be usedB、 The TypeConvertor.ConvertTo method should be usedC、 The InternalsVisibleTo attribute should be usedD、 The Type Convertor.ConvertFrom method should be used

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Today you notice that applications that run on the server have poor performances. You doubt that this has something to do with table scans. You have to capture the appropriate information by using an appropriate Windows System Monitor object. In the options below, which performance object should you use? ()AYou should use SQLServer:Buffer ManagerBYou should use SQLServer:Memory Manager CYou should use SQLServer:Databases DYou should use SQLServer:Access Methods

单选题You have a single Active Directory directory service domain. All servers run Windows Server 2003. You need to specify the list of applications that users are permitted to run. You create a new Group Policy object (GPO) and link it to the domain.  What should you do next?()A Configure Software Restriction Policies Group Policy settings.B Configure the Enable user control over installs Group Policy setting.C Assign all approved applications.D Publish all approved applications.

问答题Write a memo in about 50 words. You are the Personnel Manager of a company, and have been approached by your IT Department to recruit three new members of staff. Write a memo to Miss Kate Bush, the Manager of the IT Department, ·informing her you have received over 100 applications and have selected 10 candidates for interview, ·telling her you will write to the candidates inviting them for interview, and ·asking her to tell you the time and the place of the interview.

单选题You upgrade 11 computers in the accounting department from Windows NT Workstation 4.0 to Windows 2000 Professional. All of the upgraded computers are configured to have the default security settings.   After the upgrade, users in the accounting department report that they can no longer run any financial or credit applications on their computers.   You want all accounting department users to be able to run these applications. You want to allow only the rights that allow users to run the applications.   What should you do?()AAdd each user account to the Power Users group on that user’s computer.BConfigure the financial and credit applications to run as services on the computers in the accounting department.CApply the Compatws.inf security template to the local security policy of the computers in the accounting department.DUse the Computer Management console to configure separate memory spaces for each financial and credit application on the accounting department computers.

单选题You have a computer that runs Windows 7. You need to identify which applications were installed during thelast week.  What should you do?()AFrom Reliability Monitor, review the informational events.BFrom System Information, review the Software Environment.CFrom Performance Monitor, review the System Diagnostics Report.DFrom Performance Monitor, run the System Performance Data Collector Set.

单选题You are responsible for Company's network.  You have been assigned the task to create and deploy a standard Windows 2000 Professional image to 1,000 new client computers in the Company's main office. You log on to a client computer named DuplicateTK by using the local administrator account. You install three Windows 2000 Professional compatible software packages on DuplicateTK. After the software installations are done you create an image with a third-party imaging software. You deploy the image to a test client computer and join the client to a domain. When you log on to the test computer by using a domain user account, the new applications do not appear in the start menu. You need to be able to re-create the image to include the applications in the Start menu for all users.  What action should you take on DuplicateTK?()AAllow the local Users group Read  Execute permission on the parent folder that contains the applications.BRun the change user / install command, and the run the change user / execute command.CReinstall the applications by using the Control Panel, Add/Remove Program wizard.DCopy the local administrators profile over the default user profile.

单选题You are using flat files as the data source for one of your data warehousing applications. You plan to move the data from the flat file structures to an Oracle database to optimize the application performance. In your database you have clustered tables.  While migrating the data, you want to have minimal impact on the database performance and optimize the data load operation. Which method would you use to load data into Oracle database?()Ause the external table populationBuse the Oracle Data Pump export and import utilityCuse the conventional path data load of SQL*Loader utilityDuse the direct path data load of Oracle export and import utility

单选题Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. You have a Remote Desktop Session Host (RD Session Host) server an d a Remote Desktop Web Access (RD Web Access) server.You enable several RemoteApp applications on the RD Session Host server.You need to configure access to RemoteApp applications so that RD Web Access users see only applications to which they have been granted access. What should you do?()AUse the RemoteApp Wizard to add to the RemoteApp Programs list setting.BAssign domain users and domain security groups to each RemoteApp application.CUse the RemoteApp Wizard to configure the RemoteApp program is a vailable through RD Web Access setting.DSpecify custom menu locations on the RD Session Host server for each domain security group by using a Group Policy object (GPO).

单选题Your Windows 2000 Professional computer contains a 166 MHz processor 64 MB of RAM and 750 MB of free disk space. You have installed a number of applications on your computer including a word processing program, a spreadsheet program, a third party scientific application and a multimedia player. You notice that when you have several of these applications open simultaneously the performance of your computer is noticeably slower. You run system monitor notice that the processor time and queue counters are showing high readings was blue and red line touching 100%. What should you do to solve this problem?()AUse diskprode to modify existing disk sector values.BUpgrade your processor.CIncrease the amount of free disk space.DIncrease the amount of RAM.

单选题You are the administrator of a Windows XP Professional computer. You run five 16-bit applications on the computer. You want to monitor the performance of the computer when all five applications run at the same time. You use System Monitor to collect the performance data. The performance counters you want to include in your analysis are IO Read Bytes/sec, IO Write Bytes/sec, and Page Faults/sec. You want to ensure that you can collect these counters for each application. What should you do?()ARun the five 16-bit applications in one process. Monitor each thread of Ntvdm.exe. BRun each of the five 16-bit applications in its own memory space. Monitor each instance of Ntvdm.exe.  CRun the five 16-bit applications in Windows 95 compatibility mode. Monitor each instance of the applications. DStart the five 16-bit applications by using the Start /normal command. Monitor each instance of the applications.

单选题You are designing an application that will interact with non-Windows applications over unreliable connections.   Each non-Windows application will have its own security token.   You need to recommend an approach for non-Windows applications to retrieve messages.  What should you recommend?()A Retrieve messages from a Windows Azure Queue.B Retrieve messages from Windows Azure Table storage.C Retrieve messages from a blob storage container that has a private access policy.D Retrieve messages from the Windows Azure AppFabric Service Bus message buffer.

单选题You are the Database Administrator for WonderWeb, which has recently acquired a media company TXGlobal. You have been assigned the task to migrate all the database applications of TXGlobal to the database server of WonderWeb. To accommodate more database applications, you need to add disks to the existing disk group. Whenever you add or remove disks from the disk group, Automatic Storage Management (ASM) rebalancing distributes the data evenly across all the disks of the disk group. Which background process performs this actual rebalancing activity, resulting in the movement of data extents in the disk groups?()A ASMBB ARBnC RBAL in the ASM instanceD RBAL in the database instance