Users in your production database complain that they are getting the following error message while trying to insert rows into the ORDERS table: ERROR at line 1:  ORA-01654: unable to extend index USERS.ORDERS_IND by 8 in tablespace INDEXES  While investigating, you find that the INDEXES tablespace has run out of space and there is no more free space on the disk where the data files are available.  Which two actions could you perform to overcome this error without affecting the queries that are currently being executed?()A、drop and re-create the indexB、coalesce the ORDERS_IND indexC、coalesce the INDEXES tablespaceD、drop and re-create the ORDERS tableE、rebuild the index online and move it to another tablespace

Users in your production database complain that they are getting the following error message while trying to insert rows into the ORDERS table: ERROR at line 1:  ORA-01654: unable to extend index USERS.ORDERS_IND by 8 in tablespace INDEXES  While investigating, you find that the INDEXES tablespace has run out of space and there is no more free space on the disk where the data files are available.  Which two actions could you perform to overcome this error without affecting the queries that are currently being executed?()

  • A、drop and re-create the index
  • B、coalesce the ORDERS_IND index
  • C、coalesce the INDEXES tablespace
  • D、drop and re-create the ORDERS table
  • E、rebuild the index online and move it to another tablespace

相关考题:

You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D

You are the administrator of a database that contains 64 lookup tables. These tables store static data that should not change. However, users report that some of this data is being changed. You need to prevent users from modifying the data.You want to minimize changes to your security model and to your database applications. How should you modify the database?A.Create a filegroup named LOOKUP. Move the lookup tables to this filegroup. Select the read only check box for the filegroup.B.Create a database role named datamodifier. Grant SELECT permissions to the datamodifier role. Add all users to the role.C.Deny INSERT, UPDATE, and DELETE permissions for all users. Create stored procedures that modify data in all tables except lookup tables. Require users to modify data through these stored procedures.D.Create a view of the lookup tables. Use the view to allow users access to the lookup tables.

Twenty database users are connected to your database. Five of the users are running long queries involving sort operations. The TEMP tablespace is the default temporary tablespace for your database. You are performing offline tablespace backups of individual tablespaces and erroneously execute the following statement:   SQLALTER TABLSPACE temp OFFLINE NORMAL;   What is the result of this statement?()A、 The TEMP tablespace is taken offline. The users using the TEMP tablespace for sorting are disconnected after their queries complete.B、 The TEMP tablespace is taken offline. The users using the TEMP tablespace for sorting are disconnected and must re-execute their queries.C、 The TEMP tablespace is taken offline. The users using the TEMP tablespace for sorting are not disconnected, but these users must re-execute their queries.D、 The TEMP tablespace is not taken offline. The users using the TEMP tablespace for sorting are not disconnected, and their queries execute successfully.

Your company has a single active directory domain. The company network is protected by a firewall. Remote users connect to your network through a VPN server by using PPTP. When the users try to connect to the VPN server, they receive the following error message: Error 721: The remote computer is not responding. You need to ensure that users can establish a VPN connection. What should you do? ()A、Open port 1423 on the firewallB、Open port 1723 on the firewallC、Open port 3389 on the firewallD、Open port 6000 on the firewall

Unfortunately,quite a number of the users a redissatisfied()your Straw Baskets supplied to Order No.T90.A、toB、withC、onD、above

Your end users will need to change values in a REF lookup field in the form application you create. To facilitate choosing a new appropriate value, your provide them with? ()A、An LOV for REFS. B、A list item for REFs. C、A radio group for REFs. D、A hierarchical tree for REFS

There is a problem with one of the disks used for your database and your system administrator informs you that the disk needs to be replaced. The replacement disk will not be available until tomorrow.  There was only one data file on this disk; it belongs to the USERS tablespace in your PROD database. Your PROD database runs in ARCHIVELOG mode and nightly online backups are taken. The users need to be able to access the data in the USERS tablespace before the replacement disk arrives. You have already taken the USERS tablespace offline and have restored the data file from last night’s backup to a new disk. Which additional steps are required in order to make the USERS tablespace available?()A、Only bring the tablespace back online.B、Only recover the tablespace and then bring the tablespace back online.C、Shut down the database, recover the data file and then start up the database.D、Issue the ALTER DATABASE RENAME FILE command, recover the tablespace, and then bring the tablespace online.E、Recover the tablespace, issue the ALTER DATABASE RENAME FILE command, and then bring the tablespace online.

You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you are located.  A new TestKing.com compliance policy requires that e-mail messages sent to the marketing users olderthan 150 days be deleted and e-mail messages sent to users in other departments are deleted after 90days. You receive an intruction from the CIO to recommend a solution to management that will complywith the eompliance policy. What should you do?()A、Your best option would be to create two Managed Folder mailbox policies.You should then use one for users in the marketing department and the other for users in the other departmens.B、Your best option would be configure deleted item retention for all testking.com users.C、Your best option would be to create two new message classifications.You should then use one for e-mails sent to users in the marketing department and the other for e-mails sent to users in the other departments.D、Your best option would be to configure Personal Archives for users in the marketing department.

You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker.  You need to prevent your co-worker from modifying your wireless network profile.  What should you do?()A、Disable the Connect even if the network is not broadcasting option.B、In the Network and Sharing Center window, click the Diagnose and repair option.C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.

Your computer is part of a workgroup. You share files with other users on the network. You configure exceptions in Microsoft Windows Firewall to allow file sharing. Users report that they are unable to connect to your computer.  You need to ensure that other users are able to access only the shared files.  What should you do? ()A、Restart the Workstation service on your computer.B、Change all of your TCP port exceptions to UDP port exceptions.C、Ensure parental controls are not configured to block file sharing.D、Clear the Block all incoming connections check box in Windows Firewall.

Rate your level of proficiency with monitoring and optimizing system performance and reliability of Windows XP Professional for desktop and mobile users.()A、Very HighB、HighC、ModerateD、LowE、Very Low

Your network consists of an Active Directory domain named contoso.com. You have a computer namedcomputer1.contoso.com. Your network is configured to use only IPv6. You need to request that a DNS record be created to enable users to connect to your computer by using the name dev.contoso.com.  Which type of record should you request ?()A、AB、AAAAC、HINFOD、NAPTR

Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP.When the users try to connect to the VPN server, they receive the following error message :Error 721:The remote computer is not responding.You need to ensure that users can establish a VPN connection.What should you do?()A、Open port 1423 on the firewall.B、Open port 1723 on the firewall.C、Open port 3389 on the firewall.D、Open port 6000 on the firewall.

You have an Exchange Server 2010 organization.Users report that they can share free/busy information with users at a federated partner, but they cannot share contacts with those users. You need to ensure that your users can share contacts with users at the federated partner.  What should you modify?()A、the Federation TrustB、the EWS virtual directoryC、the default sharing policyD、the Organizational Relationship

You are designing a strategy for migrating to the new environment.  Which two factions from your current environment will affect your migration strategy?()A、 Trusts between domainsB、 Number of BDC s in each domainC、 Users and resources in each domainD、 Current hardware for domain controllersE、 Current amount of replication traffic over WAN links

单选题You create a shared Internet connection on a Windows 2000 Professional computer. Your network has 10 users on the LAN. All of the users can connect to HTTP sites, FTP sites, and streaming audio content on the Internet. One of the computers on your LAN is running an FTP host application. Users on the Internet cannot connect to the FTP host on your network. What should you do?()AConfigure the FTP host to accept incoming requests on service port 80.BConfigure an Internet Connection Sharing application type for FTP to use remote server port 23.CConfigure an Internet Connection Sharing service type for FTP use service port 21 on the FTP host computer.DConfigure an Internet Connection Sharing service type for FTP use service port 23 on the FTP host computer.

单选题There is a problem with one of the disks used for your database and your system administrator informs you that the disk needs to be replaced. The replacement disk will not be available until tomorrow.  There was only one data file on this disk; it belongs to the USERS tablespace in your PROD database. Your PROD database runs in ARCHIVELOG mode and nightly online backups are taken. The users need to be able to access the data in the USERS tablespace before the replacement disk arrives. You have already taken the USERS tablespace offline and have restored the data file from last night’s backup to a new disk. Which additional steps are required in order to make the USERS tablespace available?()AOnly bring the tablespace back online.BOnly recover the tablespace and then bring the tablespace back online.CShut down the database, recover the data file and then start up the database.DIssue the ALTER DATABASE RENAME FILE command, recover the tablespace, and then bring the tablespace online.ERecover the tablespace, issue the ALTER DATABASE RENAME FILE command, and then bring the tablespace online.

多选题Your manager has informed you that only specific users can have access to the Preferred Members role, and that these users are restricted to the Preferred Members role. The Preferred Members role-mapping rule is currently set as the last rule in your role-mapping rules and is based on username. Currently all users are assigned to the Preferred Members role-mapping rule. Which three changes in the admin GUI will enforce your managers change request?()AMove the Preferred Members role-mapping rule to the top of the list.BRemove the Preferred Members role from the role-mapping rule.CEdit the Preferred Members role-mapping rule so that the username is equal to *.DEdit the Preferred Members role-mapping rule so that only the select users are assigned to the role-mapping rule.EEdit the Preferred Members role-mapping rule and select Stop processing rules when this rule matches.

单选题ou need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package.  Which statement is true regarding the ACL created?()A It is a list of remote database links stored in the XML file that are available to the users of the database.B It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.C It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.D It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.

单选题Rate your level of proficiency with monitoring and optimizing system performance and reliability of Windows XP Professional for desktop and mobile users.()AVery HighBHighCModerateDLowEVery Low

单选题You have an Exchange Server 2010 organization.Users report that they can share free/busy information with users at a federated partner, but they cannot share contacts with those users. You need to ensure that your users can share contacts with users at the federated partner.  What should you modify?()Athe Federation TrustBthe EWS virtual directoryCthe default sharing policyDthe Organizational Relationship

单选题You need to include a disclaimer to all sent messages in your organization. Some of the users require message encryption.How do you make sure that disclaimer can be included in encrypted messages?()AInstruct the users to use IRM encryption method onlyBInstruct the users to use S/MIME encryption method onlyCUsing command New-ExchangeCertificate cmdletDUsing the Set-ExchangeServer cmdlet

单选题Twenty database users are connected to your database. Five of the users are running long queries involving sort operations. The TEMP tablespace is the default temporary tablespace for your database. You are performing offline tablespace backups of individual tablespaces and erroneously execute the following statement:   SQLALTER TABLSPACE temp OFFLINE NORMAL;   What is the result of this statement?()A The TEMP tablespace is taken offline. The users using the TEMP tablespace for sorting are disconnected after their queries complete.B The TEMP tablespace is taken offline. The users using the TEMP tablespace for sorting are disconnected and must re-execute their queries.C The TEMP tablespace is taken offline. The users using the TEMP tablespace for sorting are not disconnected, but these users must re-execute their queries.D The TEMP tablespace is not taken offline. The users using the TEMP tablespace for sorting are not disconnected, and their queries execute successfully.

单选题You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()AUse Windows Explorer to receive the offline filesBUsing the Windows Explorer, disable the cache for the reports on the network shareCUse the Windows NT explorer to grant the special access for the reports on the network  shareDUse the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection.

单选题You deploy your companys Internet Web site. You need to deny anonymous access to the Web site, allowing only authenticated users. Which code segment should you use?()Aauthorization allow users=?/ /authorizationBauthorization deny users=?/ /authorizationCauthorization deny users=*//authorizationDauthorization allow users=*/ /authorization

单选题Your network contains Exchange Server 2010 servers.  All users access their mailboxes by using Outlook Web App (OWA). Your companys compliance policy states the following: .All e-mail messages that contain customer contracts must be stored for three years .Users must be able to classify e-mail messages that relate to customer contracts .Users must be able to move e-mail messages to any folder  You need to recommend a solution that supports the requirements of the compliance policy.  What should you recommend?()AManaged Folder mailbox policiesBan OWA mailbox policyCPersonal Archives and an Archive policyDRetention Policy Tags and a Retention Policy

单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2.   All client computers run Windows 7. Some users have laptop computers and work remotely from home.   You need to plan a data provisioning infrastructure to secure sensitive files. Your plan must meet the following requirements:   èFiles must be stored in an encrypted format.   èFiles must be accessible by remote users over the Internet.   èFiles must be encrypted while they are transmitted over the Internet. What should you include in your plan?()ADeploy one Microsoft SharePoint Foundation 2010 site. Require users to access the SharePoint site by using a Secure Socket Transmission Protocol (SSTP) connection.BDeploy two Microsoft SharePoint Foundation 2010 sites.Configure one site for internal users. Configure the other site for remote users. Publish the SharePoint sites by using HTTPS.CConfigure a Network Policy and Access Services (NPAS) server to act as a VPN server. Require remote users to access the files by using an IPsec connection to the VPN server.DStore all sensitive files in folders that are encrypted by using Encrypting File System (EFS). Require  remote users to access the files by using Secure Socket Transmission Protocol (SSTP).