单选题Which is the correct description of the significance of the ORACLE_HOME environmental variable?()AIt specifies the directory containing the Oracle software.BIt specifies the directory containing the Oracle-Managed Files.CIt specifies the directory for database files, if not specified explicitly.DIt specifies the base directory of Optimal Flexible Architecture (OFA) .
单选题
Which is the correct description of the significance of the ORACLE_HOME environmental variable?()
A
It specifies the directory containing the Oracle software.
B
It specifies the directory containing the Oracle-Managed Files.
C
It specifies the directory for database files, if not specified explicitly.
D
It specifies the base directory of Optimal Flexible Architecture (OFA) .
参考解析
解析:
暂无解析
相关考题:
You are managing the APPPROD database as a DBA which is not using the Oracle-managed files. You plan to duplicate this database in the same system with the name DUPDB.You want to create the same directory structure for duplicate database files as of the target database.You executed the following RMAN commands:What are the implications of this command?()A. It creates database files for the duplicate database under the Oracle base with a different directory for the duplicate database.B. It overwrites data files of the target database because a different location for data files is not mentioned for the duplicate database.C. It creates database files for the duplicate database under the same Oracle home as that of the target database with the same directory structure.D. It creates database files for the duplicate database under the same Oracle home as that of the target but with a different directory for the duplicate database.
Which statement is true about the log-output variable?() A.It is a static variable and can be set only at MySQL server startupB.It enables and starts the General Query LogC.It sets the target location for the binary logs generated by the MySQL severD.It specifies output destinations for the slow and General Query logs
Given that the current directory is empty, and that the user has read and write permissions, and the following:Which statement is true?() A.Compilation fails.B.The file system has a new empty directory named dir.C.The file system has a new empty directory named newDir.D.The file system has a directory named dir, containing a file f1.txt.E.The file system has a directory named newDir, containing a file f1.txt.
Referring to the exhibit, what is the purpose of the targets section of the configuration?() A. It defines which devices will be sending traps.B. It specifies where to send traps.C. It defines the IP addresses of management systems that can access the device.D. It specifies which devices can be polled for SNMP data.
Which of the following statements is TRUE about mounting a file system?() A.A file system cannot be mounted on a directory containing data.B.Mounting a file system on a mount point containing data will delete the data.C.Mounting a file system on a amount point containing data will make the data temporarily inaccessible.D.A systems administrator must manually create an empty directory prior to mounting an AIX JFS.
You are configuring for Oracle Shared Server. Which service is required? ()A、Oracle Net ServiceB、Oracle HTTP ServiceC、Oracle Paging ServiceD、Internet Directory Service
What is the objective of the aaa authentication login console-in local command?()A、It specifies the login authentication method list named console-in using the local user database on the routerB、It specifies the login authorization method list named console-in using the local RADIUS username-password data baseC、It specifies the login authentication list named console-in using the local username- password data base on the routerD、It specifies the login authorization method list named console-in using the local username- password data base on the router
Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。A、It specifies use of a static encryption key that must be changed frequently to enhance securityB、It requires use of an open authentication methodC、It specifies the use of dynamic encryption keys that change each time a client establishes a connectionD、It requires that all access points and wireless devices use the same encryption keyE、It includes authentication by PSK
Which of the following specifies a set of consistent requirements for a workstation or server?()A、Vulnerability assessmentB、Imaging softwareC、Patch managementD、Configuration baseline
Which two statements are true of a network mask?()A、A subnet mask specifies the portion of an IP address that is in a binary formatB、A subnet mask specifies the portion of an IP address that is in a decimal formatC、A subnet mask specifies the portion of an IP address that represents a network prefixD、A subnet mask specifies the portion of an IP address that represetns network hosts
Which two statements are true of a network mask?()A、A subnet mask specifies the portion of an IP address that is in a binary format.B、A subnet mask specifies the portion of an IP address that is in a decimal format.C、A subnet mask specifies the portion of an IP address that represents a network prefix.D、A subnet mask specifies the portion of an IP address that represents network hosts.
When you create a backup control file, where is the resulting file written to?() A、 The database user dump destination directoryB、 The database diagnostic destination directoryC、 To $ORACLE_HOME/rdbmsD、 To $ORACLE_HOME/adminE、 To the directory and filename you specify in the command
Which statement is true regarding checkpoints and recovery?()A、A checkpoint defines the highest system change number (SCN).B、All redo entries higher or at the SCN are known to be written to the data files.C、Only the redo records containing SCNs higher then the checkpoint need to be applied during recovery.D、The LOG_CHECKPOINT_INTERVAL initialization parameter specifies the amount of time between incremental checkpoints.
Which statement is true about the log-output variable?()A、It is a static variable and can be set only at MySQL server startupB、It enables and starts the General Query LogC、It sets the target location for the binary logs generated by the MySQL severD、It specifies output destinations for the slow and General Query logs
单选题Which two statements are true of a network mask?()AA subnet mask specifies the portion of an IP address that is in a binary formatBA subnet mask specifies the portion of an IP address that is in a decimal formatCA subnet mask specifies the portion of an IP address that represents a network prefixDA subnet mask specifies the portion of an IP address that represetns network hosts
单选题What is the objective of the aaa authentication login console-in local command?()AIt specifies the login authentication method list named console-in using the local user database on the routerBIt specifies the login authorization method list named console-in using the local RADIUS username-password data baseCIt specifies the login authentication list named console-in using the local username- password data base on the routerDIt specifies the login authorization method list named console-in using the local username- password data base on the router
单选题Which statement is true regarding checkpoints and recovery?()AA checkpoint defines the highest system change number (SCN).BAll redo entries higher or at the SCN are known to be written to the data files.COnly the redo records containing SCNs higher then the checkpoint need to be applied during recovery.DThe LOG_CHECKPOINT_INTERVAL initialization parameter specifies the amount of time between incremental checkpoints.
多选题The NLS_TERRITORY parameter specifies the default conventions to be used for which of the following globalization elements?()ADate formatBDecimal characterCGroup separatorDFirst day of the monthENone of the aboveFAll of the above
单选题You are managing the APPPROD database as a DBA which is not using the Oracle-managed files. You plan to duplicate this database in the same system with the name DUPDB.You want to create the same directory structure for duplicate database files as of the target database. You executed the following RMAN commands: RMAN CONNECT TARGET sys/sys@APPPROD RMAN CONNECT AUXILIARY sys/sys@DUPDB RMAN DUPLICATE TARGET DATABASE TO dupdb FROM ACTIVE DATABASE PASSWORD FILE SPILE NOFILENAMECHECK; What are the implications of this command?()A It creates database files for the duplicate database under the Oracle base with a different directory for the duplicate database.B It overwrites data files of the target database because a different location for data files is not mentioned for the duplicate database.C It creates database files for the duplicate database under the same Oracle home as that of the target database with the same directory structure.D It creates database files for the duplicate database under the same Oracle home as that of the target but with a different directory for the duplicate database.
单选题Which statement is true about the log-output variable?()AIt is a static variable and can be set only at MySQL server startupBIt enables and starts the General Query LogCIt sets the target location for the binary logs generated by the MySQL severDIt specifies output destinations for the slow and General Query logs
单选题Referring to the exhibit, what is the purpose of the targets section of the configuration?()A It defines which devices will be sending traps.B It specifies where to send traps.C It defines the IP addresses of management systems that can access the device.D It specifies which devices can be polled for SNMP data.
多选题Which two statements are true of a network mask?()AA subnet mask specifies the portion of an IP address that is in a binary format.BA subnet mask specifies the portion of an IP address that is in a decimal format.CA subnet mask specifies the portion of an IP address that represents a network prefix.DA subnet mask specifies the portion of an IP address that represents network hosts.
单选题Which of the following specifies a set of consistent requirements for a workstation or server?()AVulnerability assessmentBImaging softwareCPatch managementDConfiguration baseline
单选题You are configuring for Oracle Shared Server. Which service is required? ()AOracle Net ServiceBOracle HTTP ServiceCOracle Paging ServiceDInternet Directory Service
单选题When you create a backup control file, where is the resulting file written to?()A The database user dump destination directoryB The database diagnostic destination directoryC To $ORACLE_HOME/rdbmsD To $ORACLE_HOME/adminE To the directory and filename you specify in the command
单选题Which of the following statements is TRUE about mounting a file system?()AA file system cannot be mounted on a directory containing data.BMounting a file system on a mount point containing data will delete the data.CMounting a file system on a amount point containing data will make the data temporarily inaccessible.DA systems administrator must manually create an empty directory prior to mounting an AIX JFS.
单选题Which of the following environment variables specifies a non-default location for the listener configuration file?()ALSN_ADMINBTNS_ADMINCADMIN_TNSDTSN_ADMIN