Your system performs heavy transaction processing between 8:00 A.M. and 5:00 P.M. but runs batch processing and reports after that. You decide to create a separate resource plan to govern resource allocation for each time period. Which scheduler object will you use to switch automatically between the two resource plans?()  A、 WindowB、 ProgramC、 Job_ClassD、 Window group

Your system performs heavy transaction processing between 8:00 A.M. and 5:00 P.M. but runs batch processing and reports after that. You decide to create a separate resource plan to govern resource allocation for each time period. Which scheduler object will you use to switch automatically between the two resource plans?()  

  • A、 Window
  • B、 Program
  • C、 Job_Class
  • D、 Window group

相关考题:

Your organization decided to upgrade the existing Oracle 10g database to Oracle 11g database in a multiprocessor environment. At the end of the upgrade, you observe that the DBA executes the following script:SQL @utlrp.sqlWhat is the significance of executing this script?()A. It performs parallel recompilation of only the stored PL/SQL code.B. It performs sequential recompilation of only the stored PL/SQL code.C. It performs parallel recompilation of any stored PL/SQL as well as Java code.D. It performs sequential recompilation of any stored PL/SQL as well as Java code.

controls the operation of the computer and performs it's data processing functions.A.CPUB.Hard diskC.MemoryD.Database system

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()A. core layerB. bridging two VLANs on one switchC. between two Layer 2 devices withtrunkingD. between two Layer 2 devices withouttrunking

With our new Quick Pay system, your monthly subscription fee will be debited automati-cally from the bank account of your__________.A.choiceB.chooseC.choicesD.chose

In order to log()the system you have to type in your password.AinBonCin toDoff to

In order to log()the system you have to type in your password.A、inB、onC、in toD、off to

Which three functions are associated with a Cisco Unified CallManager? ()A、 connects traditional telephony devices to voice over IP infrastructureB、 converts analog signals to digital formatC、 performs voice compressionD、 performs call processingE、 performs dial plan administrationF、 performs signaling and device control

After installing a new p5 595, the system performs poorly. Which of the following services would provide updates needed to fix the problem?()A、AlertB、Fix CentralC、Software MaintenanceD、Performance Monitoring

在安装WINDOWS时,屏幕出现死机并有如下显示:windows setup was unable to update your system files. This may be virus dedication that is built-in to your machine,or by virus dedication software running on your system„„,故障原因是()A、安装盘有问题B、CD-ROM驱动器有问题C、没有关闭所有的病毒监测程序D、硬盘有问题

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()A、 has a permissive interface that is used to monitor networksB、 is an active device in the traffic pathC、 passively listens to network trafficD、 has a promiscuous interface that is used to monitor the network

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()A、 core layerB、 bridging two VLANs on one switchC、 between two Layer 2 devices with trunkingD、 between two Layer 2 devices without trunking

A system administrator performs a full backup every Saturday evening and incremental backups the rest of the week. The system failed on Thursday and needs to be restored. Which backup tapes will be required to restore the system to its most recent recoverable state?()A、Saturday’s full backup tape onlyB、Wednesday’s incremental backup tape onlyC、Saturday’s full backup and Wednesday’s incremental backup tapesD、Saturday’s full backup and Sunday’s through Wednesday’s incremental backup tapes

Every Sunday the Unix system administrator has a job that executes a full backup of the entire Unix system your database is on. Is this backup usable for backup and recovery of your database?()  A、 Yes, if the database is in ARCHIVELOG modeB、 Yes, if the database is in NOARCHIVELOG modeC、 No, the backup is not usable in any wayD、 Only if the ENABLE_ONLINE_BACKUP parameter is set to TRUE

You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()A、Control Panel  Data Sources (ODBC).B、Control Panel  System Tools  Shared Folders.C、Computer Management  System Tools  System Information.D、Computer Management  System Tools  Shared Folders  Open Files.E、Computer Management  System Tools  Shared Folders  Sessions.F、Computer Management  System Tools  Shared Folders  Shares.

A router that performs Network Address Translation (NAT) is installed between your computer and the Internet.  The router fails. You connect the computer directly to the Internet.  You need to ensure that the computer is connected to the Internet in the most secure manner possible.  What should you do?()A、Enable the Remote Desktop feature in the System Properties dialog box.B、Configure the network category of your network connection to Public.C、Configure the network category of your network connection to Private.D、Enable the Windows Collaboration Computer Name Registration Service exception in Microsoft Windows Firewall.

You are a network administrator for your company. You currently automate backups of the System State data on the servers in your network by using NTBackup. Your manager instructs you to document the procedure for restoring a server from a backup of the System State data.You need to select the correct method for performing a restoration of a backup of the System State data.What should you do?()A、Run the following command: ntbackup.exe backup /F {"FileName"}B、Run the following command: ntbackup.exe backup systemstate /F {"FileName"}C、In Control Panel, open System, and configure the Startup and Recovery settings on the Advanced tab.D、Use NTBackup interactively.

单选题You should assemble the Windows Sound System microphoneAbefore you have installed your audio hardware.Bbefore you connect it to your hardware.Cafter you have connected it to your hardware.

单选题If your bridge-to-bridge radiotelephone ceases to operate,you must().Aimmediately anchor your vessel and arrange for repairs to the systemBmoor your vessel at the nearest dock available and arrange for repairs to the systemCarrange for the repair of the system to be completed within 48 hoursDexercise due diligence to restore the system at the earliest practicable time

单选题You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()AControl Panel  Data Sources (ODBC).BControl Panel  System Tools  Shared Folders.CComputer Management  System Tools  System Information.DComputer Management  System Tools  Shared Folders  Open Files.EComputer Management  System Tools  Shared Folders  Sessions.FComputer Management  System Tools  Shared Folders  Shares.

单选题Your system performs heavy transaction processing between 8:00 A.M. and 5:00 P.M. but runs batch processing and reports after that. You decide to create a separate resource plan to govern resource allocation for each time period. Which scheduler object will you use to switch automatically between the two resource plans?()A WindowB ProgramC Job_ClassD Window group

单选题Your organization decided to upgrade the existing Oracle 10g database to Oracle 11g database in a multiprocessor environment. At the end of the upgrade,you observe that the DBA executes the following script:   SQL @utlrp.sql   What is the significance of executing this script?()A It performs parallel recompilation of only the stored PL/SQL code.B It performs sequential recompilation of only the stored PL/SQL code.C It performs parallel recompilation of any stored PL/SQL as well as Java code.D It performs sequential recompilation of any stored PL/SQL as well as Java code.

单选题You are operating your database in NOARCHIVELOG mode. Your most recent backup includes a copy of all of the data files and the control files taken when the current log sequence number was 45. You experience disk failure on the drive on which your SYSTEM tablespace data files are stored. At the time of the failure, the current log sequence number is 98. Which files should you restore to recover from the loss of the SYSTEM tablespace data files?()AOnly the data files.BAll of the data files and the control files.COnly the data files belonging to the SYSTEM tablespace.DOnly the data files belonging to the SYSTEM tablespace and the control files.

单选题Your company decided to start using RMAN in its backup strategy. Previously your company used operating system file copies. Which command is used to make RMAN aware of existing backups made by copying files at the operating system?()ACHANGEBRESYNCCCATALOGDCROSSCHECK

单选题Every Sunday the Unix system administrator has a job that executes a full backup of the entire Unix system your database is on. Is this backup usable for backup and recovery of your database?()A Yes, if the database is in ARCHIVELOG modeB Yes, if the database is in NOARCHIVELOG modeC No, the backup is not usable in any wayD Only if the ENABLE_ONLINE_BACKUP parameter is set to TRUE

单选题How can you verify that you have correctly configured SSH access to your Junos device?()Auser@router# show system servicesBuser@router show configuration servicesCuser@router# show configuration system servicesDuser@router# show system login

单选题In order to log()the system you have to type in your password.AinBonCin toDoff to

单选题Which command copies the factory-default files to your backup media?()Arequest system snapshot rescueBrequest system snapshot factoryCrequest system snapshot defaultDrequest system snapshot as-primary