多选题View the Exhibit.You executed the following command to perform a backup of the USERS tablespace: RMAN BACKUP TABLESPACE USERS; Which three types of files are backed up? ()Aall the data files belonging to the USERS tablespaceBpassword fileConline redo log filesDthe current control fileEarchived redo log filesFthe current server parameter fileGdata files belonging to the USERS tablespace and all the default tablespaces
多选题
View the Exhibit.You executed the following command to perform a backup of the USERS tablespace: RMAN> BACKUP TABLESPACE USERS; Which three types of files are backed up? ()
A
all the data files belonging to the USERS tablespace
B
password file
C
online redo log files
D
the current control file
E
archived redo log files
F
the current server parameter file
G
data files belonging to the USERS tablespace and all the default tablespaces
参考解析
解析:
暂无解析
相关考题:
Examine the output of the query that you executed to list the objects in the recycle bin:You verified that no table named SALES_TAB exists in the schema. Then you executed the following command to purge the objects in the recycle bin:SQL PURGE TABLE sales_tab;What would be the outcome of this command?()A. All three tables in the recycle bin are purgedB. Only the table with the oldest DROPSCN is purgedC. The command returns an error because multiple entries with the same name exist in the recycle binD. Only the table with the latest DROPSCN is purged
View the Exhibit to examine the error during the database startup.You open an RMAN session for the database instance. To repair the failure, you executed the following as the first command in the RMAN session:RMAN REPAIR FAILURE;Which statement describes the consequence of the command?()A. The command performs the recovery and closes the failures.B. The command only displays the advice and the RMAN script required for repair.C. The command produces an error because the ADVISE FAILURE command has not been executed before the REPAIR FAILURE command.D. The command executes the RMAN script to repair the failure and removes the entry from the Automatic Diagnostic Repository (ADR).
Examine the following command that is executed for the TRANSPORT table in the SH schema:Which statement describes the significance of this command?() A. It collects statistics into the pending area in the data dictionaryB. It creates a virtual hidden column in the CUSTOMERS_OBE tableC. It collects statistics with AUTO_SAMPLE_SIZE for ESTIMATE_PERCENTD. It creates a histogram to hold skewed information about the data in the columns
The command frame-relay map ip 10.121.16.8 102 broadcast was entered on the router. Which of the following statements is true concerning this command?()A、This command should be executed from the global configuration mode.B、The IP address 10.121.16.8 is the local router port used to forward data.C、102 is the remote DLCI that will receive the information.D、This command is required for all Frame Relay configurations.E、The broadcast option allows packets, such as RIP updates, to be forwarded across the PVC
Which of the following will occur if %temp% is executed from the run command?()A、The operating system’s temporary folder will be opened.B、Applications located in the %temp% folder will be executed.C、Applications will be deleted in the %temp% folder.D、The current user’s temporary folder will be opened.
Which of the following command allows you to view the UDI information for a Cisco device?()A、show environmentB、show statusC、show inventoryD、show hardware
The command frame-relay map ip 10.121.16.8 102 broadcast was entered on the router. Which of the following statements is true concerning this command()。A、This command should be executed from the global configuration modeB、The IP address 10.121.16.8 is the local router port used to forward dataC、102 is the remote DLCI that will receive the informationD、This command is required for all Frame Relay configurationsE、The broadcast option allows packets, such as RIP updates, to be forwarded across the PVC
A site administrator is configuring Command-level access control. Which of the following statements about Command-level access control are true? Command level access control policies: ()A、are mandatoryB、specify action group ExecuteCommandActionGroup for Controller commandsC、specify action group ViewCommandActionGroup for View commandsD、specify resource group ControllerCommandResourceGroup for Controller commandsE、specify resource group ViewCommandResourceGroup for View commands
tony would like to make it easier for users of the video application to enter new doc using the “video form”, he’d like users to be able to create new “video” doc form within the view. Which one of the following should tony so to build this interface?()A、create a view action that has the following formula:@command([create];”video”)B、create a form action that has the following formula:@command([compose];”video”)C、create a view action that has the following formula:@command([compose];”video”)D、create a database action that has the following formula:@command([compose];”video”)
Which of the following DB2 tools allows a user to execute an SQL statement and view a graphical representation of the access plan?()A、Task CenterB、Command EditorC、Developer WorkbenchD、Command Line Processor
You executed the following command to back up the control file: ALTER DATABASE BACKUP CONTROLFILE TO TRACE; What do you find in the trace file?()A、Image of the control fileB、Location of the control fileC、Contents of the control file in text formatD、SQL command to re-create the databaseE、SQL command to re-create the control fileF、Contents of the control file in binary format
View the Exhibit to examine the output of the DBA_OUTSTANDING_ALERTS view. After 30 minutes, you executed the following command: SQL SELECT reason,metric_value FROM dba_outstanding_alerts; REASON METRIC_VALUE ------------------------------------------------------------ ------------ Tablespace [TEST] is [28 percent]full 28.125 What could be the reason for the elimination of the other rows in the output()A、An Automatic Workload Repository snapshot has been taken recently.B、The non-threshold-based alerts are transferred to DBA_ALERT_HISTORY.C、The threshold alerts conditions are cleared and the alerts are transferred to DBA_ALERT_HISTORY.D、The threshold alerts related to database metrics are permanently stored in DBA_ALERT_HISTORY but not the threshold alerts related to instance metrics.
You executed the following procedure to collect statistics regarding an index: SQLANALYZE INDEX EMP_ID VALIDATE STRUCTURE; Which view will you use to determine whether you need to rebuild the index or not?() A、 INDEX_STATSB、 DBA_INDEXESC、 DBA_IND_COLUMNSD、 V$OBJECT_USAGE
You executed the following code: BACKUP VALIDATE DATABASE; BLOCKRECOVER CORRUPTION LIST; What will be the result of executing the above code?() A、 The code will run a backup validation to populate the V$BACKUP_CORRUPTION view and repair corrupt blocks, if any, recorded in the view.B、 The code will run a backup validate to populate the V$COPY_CORRUPTION view and then repair any corrupt blocks recorded in the view.C、 The code will runs a backup validate to populate the V$DATABASE_BLOCK_CORRUPTION view and then repair corrupt blocks, if any, recorded in the view.D、 The code will run a backup validate to populate the RC_BACKUP_CORRUPTION view and then repair corrupt blocks, if any, recorded in the view.
View the Exhibit.You executed the following command to perform a backup of the USERS tablespace: RMAN BACKUP TABLESPACE USERS; Which three types of files are backed up? ()A、 all the data files belonging to the USERS tablespaceB、 password fileC、 online redo log filesD、 the current control fileE、 archived redo log filesF、 the current server parameter fileG、 data files belonging to the USERS tablespace and all the default tablespaces
单选题View the Exhibit and examine the structure of the EMP table. You executed the following command to add a primary key to the EMP table: ALTER TABLE emp ADD CONSTRAINT emp_id_pk PRIMARY KEY (emp_id) USING INDEX emp_id_idx; Which statement is true regarding the effect of the command?()A The PRIMARY KEY is created along with a new index.B The PRIMARY KEY is created and it would use an existing unique index.C The PRIMARY KEY would be created in a disabled state because it is using an existing index.D The statement produces an error because the USING clause is permitted only in the CREATE TABLE command.
单选题Which of the following will occur if %temp% is executed from the run command?()AThe operating system’s temporary folder will be opened.BApplications located in the %temp% folder will be executed.CApplications will be deleted in the %temp% folder.DThe current user’s temporary folder will be opened.
多选题View the Exhibit.You executed the following command to perform a backup of the USERS tablespace: RMAN BACKUP TABLESPACE USERS; Which three types of files are backed up? ()Aall the data files belonging to the USERS tablespaceBpassword fileConline redo log filesDthe current control fileEarchived redo log filesFthe current server parameter fileGdata files belonging to the USERS tablespace and all the default tablespaces
单选题The command frame-relay map ip 10.121.16.8 102 broadcast was entered on the router. Which of the following statements is true concerning this command()。AThis command should be executed from the global configuration modeBThe IP address 10.121.16.8 is the local router port used to forward dataC102 is the remote DLCI that will receive the informationDThis command is required for all Frame Relay configurationsEThe broadcast option allows packets, such as RIP updates, to be forwarded across the PVC
单选题You executed the following code: BACKUP VALIDATE DATABASE; BLOCKRECOVER CORRUPTION LIST; What will be the result of executing the above code?()A The code will run a backup validation to populate the V$BACKUP_CORRUPTION view and repair corrupt blocks, if any, recorded in the view.B The code will run a backup validate to populate the V$COPY_CORRUPTION view and then repair any corrupt blocks recorded in the view.C The code will runs a backup validate to populate the V$DATABASE_BLOCK_CORRUPTION view and then repair corrupt blocks, if any, recorded in the view.D The code will run a backup validate to populate the RC_BACKUP_CORRUPTION view and then repair corrupt blocks, if any, recorded in the view.
单选题You executed the following command in Recovery Manager (RMAN): RMAN RESTORE CONTROLFILE; Which operation must you perform before this command is executed?()A back up the control file to traceB bring database to the MOUNT stateC open a connection to the RMAN recovery catalog, which contains the RMAN metadata for the target databaseD set the database ID (DBID), but only if the DB_NAME parameter associated with the target database is unique in the recovery catalog
单选题Examine the following command: SQL ALTER TABLE booking SHRINK SPACE COMPACT; Which activity is performed when the preceding command is executed?()AThe shrink operation touches every block in the BOOKING tableBThe high-water mark (HWM) for the BOOKING table is shifted from its original positionCThe progress of the shrink operation is saved in the bitmap blocks of the BOOKING tableDThe data manipulation language (DML) triggers on the BOOKING table are executed because the shrink operation is internally handled by the INSERT/DELETE operation
单选题You executed the following command to start the database: SQL STARTUP ORACLE instance started. Total System Global Area 281018368 bytes Fixed Size 789000 bytes Variable Size 229635576 bytes Database Buffers 50331648 bytes Redo Buffers 262144 bytes ORA-00205: error in identifying controlfile, check alert log for more info Which view would you query at this stage to investigate this missing control file?()AV$INSTANCEBV$CONTROLFILECDBA_CONTROL_FILESDV$DATABASE_PROPERTIESEV$CONTROLFILE_RECORD_SECTION
单选题Examine the following command: SQL ALTER TABLE booking SHRINK SPACE COMPACT; Which activity is performed when the preceding command is executed?()A The shrink operation touches every block in the BOOKING tableB The high-water mark (HWM) for the BOOKING table is shifted from its original positionC The progress of the shrink operation is saved in the bitmap blocks of the BOOKING tableD The data manipulation language (DML) triggers on the BOOKING table are executed because the shrink operation is internally handled by the INSERT/DELETE operation
单选题You executed the following commands in an RMAN session for your database instance that has failures: RMAN LIST FAILURE; After some time, you executed the following command in the same session: RMAN ADVISE FAILURE; But there are new failures recorded in the Automatic Diagnostic Repository (ADR) after the execution of the last LIST FAILURE command. Which statement is true for the above ADVISE FAILURE command in this scenario?()AIt produces a warning for new failures before advising for CRITICAL and HIGH failures.BIt ignores new failures and considers the failures listed in the last LIST FAILURE command only.CIt produces an error with recommendation to run the LIST FAILURE command before the ADVISE FAILURE command.DIt produces advice only for new failures and the failures listed in the last LIST FAILURE command are ignored.
单选题A view is created with the following statement:CREATE VIEW v1 AS SELECT col1, col2, col3 FROM t1 WHERE col4 1000 ; When will DB2 access the data from table T1 for view V1?()AWhen view V1 is createdBEach time the REFRESH VIEW v1 statement is executedCEach time an SQL statement is executed against view V1DOnly the first time an SQL statement is executed against view V1
单选题You executed the following command in Recovery Manager (RMAN): RMAN RESTORE CONTROLFILE; Which operation must you perform before this command is executed?()Aback up the control file to traceBbring database to the MOUNT stateCopen a connection to the RMAN recovery catalog, which contains the RMAN metadata for the target databaseDset the database ID (DBID), but only if the DB_NAME parameter associated with the target database is unique in the recovery catalog
单选题You executed the following command to back up the control file: ALTER DATABASE BACKUP CONTROLFILE TO TRACE; What do you find in the trace file?()AImage of the control fileBLocation of the control fileCContents of the control file in text formatDSQL command to re-create the databaseESQL command to re-create the control fileFContents of the control file in binary format