Users are performing a large volume of inserts and deletes on the application tables in the APPS tablespace. You observe that there are several warning alerts being generated for the APPS tablespace space usage metrics. Currently, the warning threshold for the tablespace usage metrics is set to 70%. To make the generated alerts more useful as a problem identification tool, you want to reduce the frequency of alert generation for the tablespace usage metrics for the APPS tablespace. What should you do?()A、 Disable SQL tracing for the APPS tablespace.B、 Disable logging attributes for the APPS tablespace.C、 Modify the tablespace to be a dictionary-managed tablespace.D、 Increase the critical threshold value for the tablespace space usage metrics for the APPS tablespace.E、 Increase the warning threshold value for the tablespace space usage metric for the APPS tablespace.

Users are performing a large volume of inserts and deletes on the application tables in the APPS tablespace. You observe that there are several warning alerts being generated for the APPS tablespace space usage metrics. Currently, the warning threshold for the tablespace usage metrics is set to 70%. To make the generated alerts more useful as a problem identification tool, you want to reduce the frequency of alert generation for the tablespace usage metrics for the APPS tablespace. What should you do?()

  • A、 Disable SQL tracing for the APPS tablespace.
  • B、 Disable logging attributes for the APPS tablespace.
  • C、 Modify the tablespace to be a dictionary-managed tablespace.
  • D、 Increase the critical threshold value for the tablespace space usage metrics for the APPS tablespace.
  • E、 Increase the warning threshold value for the tablespace space usage metric for the APPS tablespace.

相关考题:

Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" >"Sensors" >"Sensor Event Policies" >[rule name] to accomplish this?()A. IgnoreB. Replace users roleC. Terminate user sessionD. Disable user account

How many users are supported on the Cisco Unified Communications models 540 and 560 platforms?()A、 16 users on the UC540 and 64 users on the UC560B、 32 users on the UC540 and 64 users on the UC560C、 32 users on the UC540 and 104 users on the UC560D、 16 users on the UC540 and 104 users on the UC560

Which three options are network evaluation techniques? ()A、Performing end-user training on the use of antispyware softwareB、Performing virus scansC、Scanning a network for active IP addresses and open ports on those IP addressesD、Using password-cracking utilities

Under which circumstance will a branch ISR router contain interface vlan configurations?()A、performing inter - VLAN routingB、performing 802.1Q trunkingC、performi ng ISL trunkingD、Ethernet Switch Module installedE、ADSL WIC installedF、running Call Manager Express

在缺省配置下,普通用户登录到Windows 2000 Professional中和Windows 2000 Server中后分别所在的组为()A、Users,UsersB、Power Users,Power UsersC、Users,Power UsersD、Power Users,Users

Twenty database users are connected to your database. Five of the users are running long queries involving sort operations. The TEMP tablespace is the default temporary tablespace for your database. You are performing offline tablespace backups of individual tablespaces and erroneously execute the following statement:   SQLALTER TABLSPACE temp OFFLINE NORMAL;   What is the result of this statement?()A、 The TEMP tablespace is taken offline. The users using the TEMP tablespace for sorting are disconnected after their queries complete.B、 The TEMP tablespace is taken offline. The users using the TEMP tablespace for sorting are disconnected and must re-execute their queries.C、 The TEMP tablespace is taken offline. The users using the TEMP tablespace for sorting are not disconnected, but these users must re-execute their queries.D、 The TEMP tablespace is not taken offline. The users using the TEMP tablespace for sorting are not disconnected, and their queries execute successfully.

下面哪些可以将john添加到users数组中?()A、$users[]=‘john’;B、array_add($users,’john’);C、array_push($users,‘john’);D、$users[“name”]=‘john’;

What are three common reasons why customers are saying that they need to evolve their datacenter?()A、architectures that is inflexible and inefficientB、desire to use the same vender for desktop and server deploymentsC、selecting best-performing vendors for each individual componentD、existing equipment has reached and of lifeE、increasing operational costs of managing data centersF、demand among users for access to information anytime, anywhere

A 4-way x445 server with 2GB of memory running Windows 2003 Server with Exchange 2003 is performing poorly.  Users are complaining of slow response times when accessing their email.  Which subsystem should be checked first as a potential bottleneck?()A、ProcessorsB、Memory subsystemC、Storage subsystemD、Network connectivity

A customer has a database application that is accessed by a large number of people through a web interface from multiple remote locations.  Which of the following questions will provide the information necessary to design the best performing storage solution?()A、How many web servers will be connected to the database?B、Will the database be run on a Windows solution?C、How many concurrent users will be accessing the database?D、What are the types of transactions run against the database?

You moved the index EMP_NO_INDX from one tablespace to another and then issued the following command to rebuild the index EMP_NO_INDX:   SQL ALTER INDEX EMP_NO_INDX REBUILD ONLINE;   Which table allows the users to access the EMP_NO_INDX index while performing the rebuild operation?() A、 Index-organized tableB、 Mapping TableC、 Clustered TableD、 Journal Table

Which two prerequisites are needed for performing workload capture and replay?()A、Close all sessions performing queries using database linksB、running the database in shared server modeC、The database on which the workload is replayed has to be a restore of the original database to a specific SCND、setting up the directory to capture the workload

The size of the largest datafile, data1.dbf, in your database is 30MB. You issued the following command:   RMANCONFIGURE MAXSETSIZE 10MB;     What will be the impact of the above setting?()A、 While performing the backup of the datafile,data1.dbf,one backup set is created.B、 While performing the backup of the datafile,data1.dbf,two backup sets are created.C、 While performing the backup of the datafile,data1.dbf,three backup sets are created.D、 While performing the backup of the datafile,data1.dbf,the command for performing a backup of the datafile,data1.dbf,will fail.

You are performing a database recovery because a user’s schema is dropped. While performing the recovery, you use the UNTIL SEQUENCE clause. Which type of database recovery are you performing?()A、 user managed complete recoveryB、 user managed incomplete recoveryC、 RMAN-based complete recoveryD、 RMAN-based incomplete recovery

You are the administrator of a Windows 2000 Professional computer. A user named Maria assists you in performing some administrative tasks. Maria is a member of local Administrators group. Users report that Maria has been viewing and changing their files.  You want Maria to be able to install programs, perform backups and manage printers, but not to view, change or read other users’ files for which permission has not been granted. You want to set up Maria’s account to have minimal rights and permission. You want to accomplish this with least amount of administrative effort.  What should you do?  ()A、 Leave Maria in the local Administrators group.  Limit her rights by using Local Policies.B、 Leave Maria in the local Administrators group. Change the NTFS provision on other users’ files to deny Maria’s request.C、 Remove Maria from the local Administrators group. Add her to both the Power Users group and Backup Operators group.D、 Remove Maria from local Administrators group.  Add her to Power User group.  Then grant her NTFS Read permission on the files to be backed up.

单选题The size of the largest datafile, data1.dbf, in your database is 30MB. You issued the following command:   RMANCONFIGURE MAXSETSIZE 10MB;     What will be the impact of the above setting?()A While performing the backup of the datafile,data1.dbf,one backup set is created.B While performing the backup of the datafile,data1.dbf,two backup sets are created.C While performing the backup of the datafile,data1.dbf,three backup sets are created.D While performing the backup of the datafile,data1.dbf,the command for performing a backup of the datafile,data1.dbf,will fail.

单选题A retail customer has a database application that is accessed by a large number of people through a web interface from multiple remote locations. Which questions will provide the information necessary to design the best performing storage solution of the following?()AHow many web servers will be connected to the database?BHow many concurrent applications will run against the database?CHow many concurrent users will be accessing the database?DWhat are the types of transactions run against the database?

单选题You are performing a database recovery because a user’s schema is dropped. While performing the recovery, you use the UNTIL SEQUENCE clause. Which type of database recovery are you performing?()A user managed complete recoveryB user managed incomplete recoveryC RMAN-based complete recoveryD RMAN-based incomplete recovery

单选题A customer is experiencing a performance bottleneck in a disk subsystem.  The server is performing sequential I/O with a small number of users requesting large files.  Which of the following would most likely resolve the bottleneck?()AIncrease seek translationBIncrease data transfer rateCDecrease rotational latencyDIncrease rotational latency

单选题You are the administrator of a Windows 2000 Professional computer. A user named Maria assists you in performing some administrative tasks. Maria is a member of local Administrators group. Users report that Maria has been viewing and changing their files.  You want Maria to be able to install programs, perform backups and manage printers, but not to view, change or read other users’ files for which permission has not been granted. You want to set up Maria’s account to have minimal rights and permission. You want to accomplish this with least amount of administrative effort.  What should you do?  ()A Leave Maria in the local Administrators group.  Limit her rights by using Local Policies.B Leave Maria in the local Administrators group. Change the NTFS provision on other users’ files to deny Maria’s request.C Remove Maria from the local Administrators group. Add her to both the Power Users group and Backup Operators group.D Remove Maria from local Administrators group.  Add her to Power User group.  Then grant her NTFS Read permission on the files to be backed up.

单选题Twenty database users are connected to your database. Five of the users are running long queries involving sort operations. The TEMP tablespace is the default temporary tablespace for your database. You are performing offline tablespace backups of individual tablespaces and erroneously execute the following statement:   SQLALTER TABLSPACE temp OFFLINE NORMAL;   What is the result of this statement?()A The TEMP tablespace is taken offline. The users using the TEMP tablespace for sorting are disconnected after their queries complete.B The TEMP tablespace is taken offline. The users using the TEMP tablespace for sorting are disconnected and must re-execute their queries.C The TEMP tablespace is taken offline. The users using the TEMP tablespace for sorting are not disconnected, but these users must re-execute their queries.D The TEMP tablespace is not taken offline. The users using the TEMP tablespace for sorting are not disconnected, and their queries execute successfully.

单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()Aby using triggersBby using external tablesCby using anonymous PL/SQL blocksDby auditing all DML operations on the table

多选题What are three common reasons why customers are saying that they need to evolve their data center? ()Ademand among users for access to information anytime, anywhereBdesire to use the same vender for desktop and server deploymentsCexisting equipment has reached and of lifeDincreasing operational costs of managing data centersEarchitectures that is inflexible and inefficientFselecting best-performing vendors for each individual component

单选题How many users are supported on the Cisco Unified Communications models 540 and 560 platforms?()A 16 users on the UC540 and 64 users on the UC560B 32 users on the UC540 and 64 users on the UC560C 32 users on the UC540 and 104 users on the UC560D 16 users on the UC540 and 104 users on the UC560

单选题In which situation would you use the Oracle Shared Server configuration?()Awhen performing export and import using Oracle Data PumpBwhen performing backup and recovery operations using Oracle Recovery ManagerCwhen performing batch processing and bulk loading operation in a data warehouse environment Din an online transaction processing (OLTP) system where large number of client sessions are idle most of the time

单选题Youre performing tablespace point-in-time recovery on a tablespace called USERS. If an object in that tablespace has a foreign key constraint owned by another object in the INDEX_TBS  which statement is true?()A You cannot perform the TSPITR with the constraints enabled.B You must perform the TSPITR recovery of both tablespaces for it to be successful.C You can perform TSPITR only on the USERS tablespace.D RMAN will determine if the INDEX_TBS tablespace must also be duplicated and will duplicate it automatically.E The TSPITR will only be successful if the constraint is enabled.

单选题You plan to control the sessions performing a huge number of I/O operations. Your requirement is to kill the session when it exceeds a specified number of I/Os. Which statement describes a solution to the above?()ASet a threshold for the default system-defined moving window baseline.BAdd directives to the Automatic Database Diagnostic Monitor (ADDM).CModify the profile for the targeted users for which control needs to be imposed.DImplement the database resource manager to add the SWITCH_IO_REQS and SWITCH_GROUP directives.

多选题下面哪些可以将john添加到users数组中?()A$users[]=‘john’;Barray_add($users,’john’);Carray_push($users,‘john’);D$users[“name”]=‘john’;