Two database users, Jack and Bill, are accessing the Certkiller STAFF table of the Certkiller DB database. When Jack modifies a value in the table, the new value is invisible to Bill.  Which is the modified value invisible to Bill?()A、The modified data are not available on disk.B、The modified data have been flushed out from memory.C、The modified rows of the Certkiller STAFF table have been locked.D、Jack has not committed the changes after modifying the value.E、Both users are accessing the database from two different machines.

Two database users, Jack and Bill, are accessing the Certkiller STAFF table of the Certkiller DB database. When Jack modifies a value in the table, the new value is invisible to Bill.  Which is the modified value invisible to Bill?()

  • A、The modified data are not available on disk.
  • B、The modified data have been flushed out from memory.
  • C、The modified rows of the Certkiller STAFF table have been locked.
  • D、Jack has not committed the changes after modifying the value.
  • E、Both users are accessing the database from two different machines.

相关考题:

You Execute the Following command to create a password file in the database server:$ orapwd file = ‘+DATA/PROD/orapwprod entries = 5 ignorecase = N format = 12’Which two statements are true about the password file?()A. It records the usernames and passwords of users when granted the DBA role.B. It contains the usernames and passwords of users for whom auditing is enabled.C. Is used by Oracle to authenticate users for remote database administration.D. It records the usernames and passwords of all users when they are added to the OSDBA or OSOPER operating system groups.E. It supports the SYSBACKUP, SYSDG, and SYSKM system privileges.

You executed this command to create a password file:$ orapwd file = orapworcl entries = 10 ignorecase = NWhich two statements are true about the password file?() A. It will permit the use of uppercase passwords for database users who have been granted the SYSOPER role.B. It contains username and passwords of database users who are members of the OSOPER operating system group.C. It contains usernames and passwords of database users who are members of the OSDBA operating system group.D. It will permit the use of lowercase passwords for database users who have granted the SYSDBA role.E. It will not permit the use of mixed case passwords for the database users who have been granted the SYSDBA role.

You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements:SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT;For which database users is the audit policy now active?()A. All users except SYSB. All users except SCOTTC. All users except sys and SCOTTD. All users except sys, system, and SCOTT

In the parameter file of the production database, the BACKGROUND_DUMP_DEST parameter is set to $ORACLE_HOME/users. Which two types of files would you find in this location?()A、the alert log fileB、the core dump filesC、the change tracking fileD、the user session trace filesE、the database audit trail filesF、the background process trace files

You plan to use static database registration for a new listener when you create it.What could be the two reasons for this?()A、More than one database is to be registered with the listener.B、The users will connect the database by using the host naming method.C、The Oracle Enterprise Manager is to be used to monitor an Oracle9i database.D、The database that is to be registered with the listener is configured in shared server mode.E、The listener is not configured on the default port of 1521 and the instance is not configured to register with a nondefault port.

You need to design a configuration for Exchange Server storage that meets the business and technical requirements. What should you do?()A、Create a single storage group. Create one database for all usersB、Create two storage groups. In each storage group, create one database. Place mailboxes for remote users in one storage group database, and place all other mailboxes in the other storage group databaseC、Create two storage groups. In each storage group, create one database. Place executive mailboxes in one storage group database, and place all other mailboxes in the other storage group databaseD、Create two storage groups. In one storage group, create a database, and place all mailboxes for remote users and executives in the database. In the other storage group, create a database for all other mailboxes

You need to ensure that the stored procedure that inserts new loan requests can access data in tables that are stored in another database on the same SQL Server instance. Which two actions should you perform?()A、Ensure that the stored procedure and the tables are owned by users that are associated with the same SQL Server login.B、Ensure that the stored procedure and the tables are owned by the same database user.C、Ensure that the stored procedure and the tables use the same database schema.D、Configure the multiuser database option on both databases.E、Configure the cross-database ownership chaining option on both databases.

What are two common reporting requirements?()A、the database connectivity methodB、the number of users in the solutionC、the number of reports being installed D、ability to send completed reports by e-mailE、reporting output available in Microsoft Excel

Due to media failure you lost one of the data files belonging to the USERS tablespace, and the tablespace is not available to use. Which statement regarding the status of the database is true?()A、The database remains open.B、The database gets dismounted.C、The database becomes read only.D、The database instance gets aborted.E、The database gets shut down automatically.F、The status of the database depends on the status of the USERS tablespace.

Your database has experienced a loss of datafile users_01.dbf, which is associated with a ablespace called USERS.  The database is still running.  Which answer properly describes the rder of the steps that you would use to recover from this error?()   a. Shut down the database.  b. Take the users_01.dbf datafile offline with the alter database command.  c. Restore the users_01.dbf datafile from backup media with the required archived redo logs.  d. Restore all users tablespace-related datafiles from backup media. e. Issue the recover tablespace users command. f. Issue the recover datafile users_01.dbf command. g. Start up the database.  h. Bring the users_01.dbf datafile online with the alter database command. A、a, c, f, gB、b, c, f, hC、a, b, c, f, gD、a, b, c, f, g, hE、b, c, f, e, g

View this parameter setting in your database:   DB_CREATE_FILE_DEST=’D:// /oracle/product/10.2.0/oradata/oracle’  You created a tablespace by using this command:   CREATE TABLESPACE USERS;  Which two statements are true about the USERS tablespace?()A、The tablespace has two data files.B、An error is reported and tablespace creation fails.C、Data files are created with names generated by the instance.D、The tablespace can be extended without specifying the data file.E、Data files belonging to the USERS tablespace cannot be renamed.

To accomplish user-managed backup for the USERS tablespace, you issued the following command to put the database in backup mode: SQL ALTER TABLESPACE users BEGIN BACKUP; While copying the file to the backup destination a power outage caused the instance to terminate abnormally. Which statement is true about the next database startup and the USERS tablespace?()A、The database will open, and the tablespace automatically comes out of the backup modeB、The database will be mounted, and recovery must be performed on the USERS tablespace.C、The database will be mounted, and data files in the USERS tablespace must be taken out of the backup mode.D、The database will not be mounted, and you must restore all the data files for the USERS tablespace from the backup, and perform recovery.

You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements: SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM; SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT; For which database users is the audit policy now active?()A、All users except SYSB、All users except SCOTTC、All users except sys and SCOTTD、All users except sys, system, and SCOTT

多选题What are two common reporting requirements?()Athe database connectivity methodBthe number of users in the solutionCthe number of reports being installedDability to send completed reports by e-mailEreporting output available in Microsoft Excel

多选题You Execute the Following command to create a password file in the database server: $ orapwd file = ‘+DATA/PROD/orapwprod entries = 5 ignorecase = N format = 12’ Which two statements are true about the password file?()AIt records the usernames and passwords of users when granted the DBA role.BIt contains the usernames and passwords of users for whom auditing is enabled.CIs used by Oracle to authenticate users for remote database administration.DIt records the usernames and passwords of all users when they are added to the OSDBA or OSOPER operating system groups.EIt supports the SYSBACKUP, SYSDG, and SYSKM system privileges.

多选题You plan to use static database registration for a new listener when you create it.What could be the two reasons for this?()AMore than one database is to be registered with the listener.BThe users will connect the database by using the host naming method.CThe Oracle Enterprise Manager is to be used to monitor an Oracle9i database.DThe database that is to be registered with the listener is configured in shared server mode.EThe listener is not configured on the default port of 1521 and the instance is not configured to register with a nondefault port.

单选题Two data files have been deleted at the operating system level by accident. Your database is running in ARCHIVELOG mode and online backups are taken nightly. One of the data files that has been deleted belongs to the USERS tablespace on the other belongs to the SYSTEM tablespace. How can you recover from this situation?()AShut down the database, restore the two data files and then start up the database. BTake the system and users tablespace offline, restore the two data files, recover the two datafiles, and then bring the SYSTEM and USERS tablespaces online. CShut down the database, restore the two data files, start up the database in MOUNT mode, recover the two data files, and then alter the database open. DTake the SYSTEM and USERS tablespaces offline, recover the two datafiles and then bring the SYSTEM and USERS tablespaces online.

单选题To accomplish user-managed backup for the USERS tablespace, you issued the following command to put the database in backup mode: SQL ALTER TABLESPACE users BEGIN BACKUP; While copying the file to the backup destination a power outage caused the instance to terminate abnormally. Which statement is true about the next database startup and the USERS tablespace?()AThe database will open, and the tablespace automatically comes out of the backup mode.BThe database will be mounted, and recovery must be performed on the USERS tablespace.CThe database will be mounted, and data files in the USERS tablespace must be taken out of the backup mode.DThe database will not be mounted, and you must restore all the data files for the USERS tablespace from the backup, and perform recovery.

多选题You executed this command to create a password file: $ orapwd file = orapworcl entries = 10 ignorecase = N Which two statements are true about the password file?()AIt will permit the use of uppercase passwords for database users who have been granted the SYSOPER role.BIt contains username and passwords of database users who are members of the OSOPER operating system group.CIt contains usernames and passwords of database users who are members of the OSDBA operating system group.DIt will permit the use of lowercase passwords for database users who have granted the SYSDBA role.EIt will not permit the use of mixed case passwords for the database users who have been granted the SYSDBA role.

多选题Your database is functioning in NOARCHIVELOG mode. Your database contains 15 tablespaces. You want to use Recovery Manager (RMAN) to perform backups.  Which two backups would you be able to perform when the database is being accessed by users?()Abackup of offline tablespacesBbackup of read­only tablespacesCbackup of system­critical tablespacesDbackup of online, locally managed tablespacesEbackup of read/write dictionary­managed tablespaces

单选题Your database is in ARCHIVELOG mode. On Friday evening, you perform an online database backup by using the BACKUP DATABASE command at the Recovery Manager (RMAN) prompt and close the  database. On Monday, the System Administrator informs you about the failure of two hard disks. One of the lost disks contains two datafiles, HR1.DBF and HR2.DBF, both of which belong to a read/write tablespace named HR. The disk also contains a datafile, USERS.DBF, which belongs to a read/write tablespace named USERS. You need to restore and recover the database backup that was performed on Friday evening. After mounting the database, you issue the following RMAN commands:        RMANRESTORE DATABASE;        RMANRECOVER DATABASE;   After successfully executing these RMAN commands, you issue the following statement using SQL*Plus:        SQLALTER DATABASE OPEN;   You receive the following errors when attempting to open the database:        ORA-01157: cannot identify/lock data file 10 see DBWR trace file        ORA-01110: data file 10: ’D:///USERS.DBF’   What is the cause of these errors?()A The USERS.DBF datafile is corrupted and cannot be restored by RMAN.B The USERS.DBF datafile was not backed up using the RMAN BACKUP DATABASE command.C The USERS.DBF datafile was not restored using the RMAN RESTORE DATABASE command.D The USERS.DBF datafile was not recovered using the RMAN RECOVER DATABASE command.

多选题You work as a database administrator for Certkiller .com. One of the database users accidentally deleted all the rows of a critical table and committed the delete at 1:30 p.m. You senior database administrator, Certkiller, asks you to retrieve the lost data. Which two actions would you use to ensure that there is no impact on other connected users while retrieving the deleted rows?()AUse a flashback query to retrieve the rows that were deletedBUseconventialincremental export and then import the affected objectCShutdown the database inNORMALmode and restart the database instanceDUse DBMS_META package to reconstruct the object using undo segmentsEUseTablespacePoint in Time Recovery (TSPITR) method to recover the table and the dataFUse Oracle DataPumptwithflashback_timeoption toentableflashback export and then import the affected object.

单选题Adam is working as a Database Administrator (DBA) for TeleSoft Corporation. His database is running in the ARCHIVELOG mode. During database startup, he discovers that one of the disks crashed, resulting in the permanent loss of a read-write USERS tablespace. The USERS01.dbf datafile belongs to the USERS tablespace and is 500 MB in size. He needs to recover the USERS tablespace from the backup. While reviewing the backup details, he discovers that the most recent available backup is five days old. This backup was taken when the USERS tablespace was read-only. After correcting the hardware problem that caused the failure, what should Adam do to recover the USERS tablespace?()A Restore the USERS01.dbf file from the backup, and open the database using the STARTUP command.B Restore the USERS01.dbf file using the RECOVER TABLESPACE command, and open the database using the ALTER DATABASE OPEN statement.C Restore the USERS01.dbf file from the backup, recover the USERS tablespace using the RECOVER TABLESPACE command, and open the database using the ALTER DATABASE OPEN statement.D Restore the USERS01.dbf file from the backup and change the status of the USERS tablespace from read-only to read-write using the ALTER TABLESPACE USERS READ WRITE statement. Then, recover the USERS tablespace using the RECOVER TABLESPACE command, and open the database using the ALTER DATABASE OPEN statement.

单选题Your database has experienced a loss of datafile users_01.dbf, which is associated with a ablespace called USERS.  The database is still running.  Which answer properly describes the rder of the steps that you would use to recover from this error?()   a. Shut down the database.  b. Take the users_01.dbf datafile offline with the alter database command.  c. Restore the users_01.dbf datafile from backup media with the required archived redo logs.  d. Restore all users tablespace-related datafiles from backup media. e. Issue the recover tablespace users command. f. Issue the recover datafile users_01.dbf command. g. Start up the database.  h. Bring the users_01.dbf datafile online with the alter database command.Aa, c, f, gBb, c, f, hCa, b, c, f, gDa, b, c, f, g, hEb, c, f, e, g

多选题View this parameter setting in your database:   DB_CREATE_FILE_DEST=’D:// /oracle/product/10.2.0/oradata/oracle’  You created a tablespace by using this command:   CREATE TABLESPACE USERS;  Which two statements are true about the USERS tablespace?()AThe tablespace has two data files.BAn error is reported and tablespace creation fails.CData files are created with names generated by the instance.DThe tablespace can be extended without specifying the data file.EData files belonging to the USERS tablespace cannot be renamed.

单选题Two database users, Jack and Bill, are accessing the SupportCenter STAFF table of the SupportCenter DB database. When Jack modifies a value in the table, the new value is invisible to Bill. Which is the modified value invisible to Bill?()AThe modified data are not available on disk.BThe modified data have been flushed out from memory.CThe modified rows of the SupportCenter STAFF table have been locked.DJack has not committed the changes after modifying the value.EBoth users are accessing the database from two different machines.

多选题In the parameter file of the production database, the BACKGROUND_DUMP_DEST parameter is set to $ORACLE_HOME/users. Which two types of files would you find in this location?()Athe alert log fileBthe core dump filesCthe change tracking fileDthe user session trace filesEthe database audit trail filesFthe background process trace files