单选题Which is the correct description of a pinned buffer in the database buffer cache()AThe buffer is currently being accessed.BThe buffer is empty and has not been used.CThe contents of the buffer have changed and must be flushed to the disk by the DBWn process. DThe buffer is a candidate for immediate aging out and its contents are synchronized with the block contents on the disk.

单选题
Which is the correct description of a pinned buffer in the database buffer cache()
A

The buffer is currently being accessed.

B

The buffer is empty and has not been used.

C

The contents of the buffer have changed and must be flushed to the disk by the DBWn process. 

D

The buffer is a candidate for immediate aging out and its contents are synchronized with the block contents on the disk.


参考解析

解析: Every buffer has an access mode:pinnedorfree(unpinned). A buffer is "pinned" in the cache so that it does not age out of memory while a user session accesses it. Multiple sessions cannot modify a pinned buffer at the same time.

相关考题:

Which of the following is the correct description of the English sound /k/ A voiceless,velar,stopB voiced,velar,stopC voiceless,alveolar,stopD voiced,alveolar,stop

The following commands are available in the Linux binary distributions of Mysql: Mysqld Mysqld_safe Mysql.server What is the correct description of each of these commands?() A.AB.BC.CD.D

Which statement describes queue and buffer managment in the E-series router?() A. Buffer memory is managed dynamically in the I/O module.B. Buffer memory is managed dynamically in the switch fabric.C. Buffer memory is managed dynamically on egress line modules.D. Buffer memory is managed dynamically on ingress line modules

Which is the branch of linguistics which studies the characteristics of speech sounds and provides methods for their description, classification and transcription?A.PhoneticsB.PhonologyC.SemanticsD.Pragmatics

Lossless Ethernet for FCoE is achieved through the use of which features?()A、 Priority flow controlB、 Buffer-to-buffer creditsC、 TCP retransmissionD、 Ethernet checksumE、 QoS policies

Which of these is a correct description of SSO?()A、It will only become active after a software failure.B、It will only become active after a hardware failure.C、It requires that Cisco NSF be enabled in order to work successfully.D、It synchronizes the MAC, FIB, and adjacency tables between Active and Standby Route Processors.

Which of these is a correct description of SSO?()A、 It will only become active after a software failure.B、 It will only become active after a hardware failure.C、 It requires that Cisco NSF be enabled in order to work successfully.D、 It synchronizes the MAC·, FIB·, and adjacency tables between Active and Standby RouteProcessors.

Which of the following provides a logical grouping of database objects?()A、ViewB、TableC、SchemaD、Buffer pool

An AIX system administrator needs to adjust the maximum amount of memory that can be pinned. Which of the following commands is used to make the change?()A、 vmtune -MB、 svmon -mC、 vmstat -sD、 schedtune -m

Which statement describes queue and buffer managment in the E-series router?()A、Buffer memory is managed dynamically in the I/O module.B、Buffer memory is managed dynamically in the switch fabric.C、Buffer memory is managed dynamically on egress line modules.D、Buffer memory is managed dynamically on ingress line modules

You noticed that large memory allocations for the Oracle backup and restore operations are causing a performance overhead on the shared pool. Which memory structure would you configure to avoid this performance overhead?()A、 recycle buffer cacheB、 large poolC、 streams poolD、 keep buffer cacheE、 redo log buffer

Which description is correct for a private VLAN community port with respect to Layer 2 communications?()   A、 It communicates with all other community ports in the private VLAN domain.B、 It communicates with only isolated ports in the private VLAN domain.C、 It communicates only with other community ports in the same community and associated promiscuous ports.D、 It communicates only with associated promiscuous and isolated ports.

Which description about asymmetric encryption algorithms is correct?()A、They use the same key for encryption and decryption of data.B、They use different keys for decryption but the same key for encryption of data.C、They use different keys for encryption and decryption of data.D、They use the same key for decryption but different keys for encryption of data.

Which of these is a correct description of Stateful Switchover?()A、 It will only become active after a software failureB、 It will only become active after a hardware failureC、 It requires that Cisco N3F· be enabled in order to work successfullyD、 It synchronizes the MAC·, FIB·, and adjacency tables between Active and Standby Route Processors

Which registry variable should be set to keep the buffer pools in memory on AIX and Linux?()A、DB2_KEEP_BP  B、DB2_PINNED_BP  C、DB2MEMDISCLAIM  D、DB2MEMMAXFREE

Which is the correct description of a pinned buffer in the database buffer cache()A、The buffer is currently being accessed.B、The buffer is empty and has not been used.C、The contents of the buffer have changed and must be flushed to the disk by the DBWn process. D、The buffer is a candidate for immediate aging out and its contents are synchronized with the block contents on the disk.

You configured the large pool for Oracle backup and restore operations. As a result, which component would require less memory?()A、 streams poolB、 shared poolC、 log bufferD、 keep buffer cacheE、 recycle buffer cache

Which component of the SGA stores parsed SQL statements is used for process sharing?()A、Buffer cache B、Redo log buffer C、Private SQL area D、Library cache E、Row cache

单选题Which of the following description of the sound segments is NOT correct? _____A[m]bilabial nasalB[j]alveolar approximantC[h]glottal fricativeD[l]alveolar lateral

单选题You noticed that large memory allocations for the Oracle backup and restore operations are causing a performance overhead on the shared pool. Which memory structure would you configure to avoid this performance overhead?()A recycle buffer cacheB large poolC streams poolD keep buffer cacheE redo log buffer

单选题Which is the correct description of a pinned buffer in the database buffer cache()AThe buffer is currently being accessed.BThe buffer is empty and has not been used.CThe contents of the buffer have changed and must be flushed to the disk by the DBWn process. DThe buffer is a candidate for immediate aging out and its contents are synchronized with the block contents on the disk.

单选题Which registry variable should be set to keep the buffer pools in memory on AIX and Linux?()ADB2_KEEP_BP  BDB2_PINNED_BP  CDB2MEMDISCLAIM  DDB2MEMMAXFREE

单选题Which description is correct for a private VLAN community port with respect to Layer 2 communications?()A It communicates with all other community ports in the private VLAN domain.B It communicates with only isolated ports in the private VLAN domain.C It communicates only with other community ports in the same community and associated promiscuous ports.D It communicates only with associated promiscuous and isolated ports.

单选题Which background process reads the redo log buffer and writes it to a file?()AARCnBDBWnCCKPTDLGWREPMONFSMON

单选题Which of these is a correct description of SSO?()AIt will only become active after a software failure.BIt will only become active after a hardware failure.CIt requires that Cisco NSF be enabled in order to work successfully.DIt synchronizes the MAC, FIB, and adjacency tables between Active and Standby Route Processors.

单选题Which description about asymmetric encryption algorithms is correct?()AThey use the same key for encryption and decryption of data.BThey use different keys for decryption but the same key for encryption of data.CThey use different keys for encryption and decryption of data.DThey use the same key for decryption but different keys for encryption of data.

单选题Which of these is a correct description of Stateful Switchover?()A It will only become active after a software failureB It will only become active after a hardware failureC It requires that Cisco N3F· be enabled in order to work successfullyD It synchronizes the MAC·, FIB·, and adjacency tables between Active and Standby Route Processors

单选题The following commands are available in the Linux binary distributions of Mysql: Mysqld Mysqld_safe Mysql.server What is the correct description of each of these commands?()A AB BC CD D