单选题A database administrator would like to examine repartitioning options for a partitioned database named PRODDB. A workload has been captured on the system (Windows) and is stored in a file named WORKLOAD.SQL. What is the proper command to run the Design Advisor so that it will evaluate the information stored in the file and give advice on re-partitioning?()Adb2advis -d proddb -i workload.sql -P Bdb2advis -d proddb -i workload.sql -partitioning Cdb2advis -d proddb -i workload.sql -m P Ddb2advis -d proddb -i workload.sql -m ALL
单选题
A database administrator would like to examine repartitioning options for a partitioned database named PRODDB. A workload has been captured on the system (Windows) and is stored in a file named WORKLOAD.SQL. What is the proper command to run the Design Advisor so that it will evaluate the information stored in the file and give advice on re-partitioning?()
A
db2advis -d proddb -i workload.sql -P
B
db2advis -d proddb -i workload.sql -partitioning
C
db2advis -d proddb -i workload.sql -m P
D
db2advis -d proddb -i workload.sql -m ALL
参考解析
解析:
暂无解析
相关考题:
In the ORACLE system, sets of SQL statements and control flow statements that have been named, compiled ,and stored in database are referred to as storedA.batchesB.proceduresC.triggersD.transactions
You are the administrator of a SQL Server 2000 computer. The server contains database named Sales. Users report that they cannot add new data to the database. You examine the properties of the database. The database is configured as shown in the Sales Properties exhibit.You examine drive E. The hard disk is configured as shown in the Local Disk Properties exhibit.You want the users to be able to add data, and you want to minimize administrative overhead. What should you do?A.Increase the maximum file size of Sales_Data to 1,500MB.B.Use the DBCC SHRINKDATABASE statement.C.Set automatic file growth to 10 percent.D.Create another data file named Sales_Data2 in a new SECONDARY filegroup.
In your database, the RESULT_CACHE_MODE parameter has been set to MANUAL in the initialization parameter file. You issued the following command: SQLSELECT /*+ RESULT_CACHE */ sale_category, sum(sale_amt) FROM sales GROUP BY sale_category; Where would the result of this query be stored()? A、 database buffer cacheB、 shared poolC、 PGAD、 large pool
An administrator has added a new device to a system and wants to determine if it has been correctly added to the ODM database. Which command would the system administrator use?()A、odmgetB、odmaddC、odmshowD、odmcreate
What is the proper way to ensure that updates to the /etc/aliases file are seen by sendmail?()A、Refresh the named daemonB、Run the alias commandC、Refresh the snmpd daemonD、Run the sendmail -bi command
A database administrator would like to examine repartitioning options for a partitioned database named PRODDB. A workload has been captured on the system (Windows) and is stored in a file named WORKLOAD.SQL. What is the proper command to run the Design Advisor so that it will evaluate the information stored in the file and give advice on re-partitioning?()A、db2advis -d proddb -i workload.sql -P B、db2advis -d proddb -i workload.sql -partitioning C、db2advis -d proddb -i workload.sql -m P D、db2advis -d proddb -i workload.sql -m ALL
A customer has a combination of fifteen Windows file servers with direct attached storage and three Power Systems with AIX database servers SAN attached to a DS4700. They would like to upgrade and plan for 40 TB capacity. The customer needs to move to a more scalable storage system to include all servers. Which of the following would be most appropriate to ask first?()A、What are Disaster RecoveryplansB、What are plans for datamigrationC、What storage system space isavailableD、DoesiSCSI meet the needs
You work as a database administrator for Certkiller .com. Your database is in NOARCHIVELOG mode. The database has been configured with three redo logs groups, and there have been five log switches. You lost one non-system-critical data file from your database. Which method would you use to recover the data file?()A、Restore all the data files and open the databaseB、Create the data file and performtablespacerecoveryC、No need to restore any file, just recover the databaseD、Restore only the system data file and recover the databaseE、Restore only lost date file and performtablespacerecovery
You were recently hired by Certkiller .com as a database administrator. You are asked to find out whether the currently functional listener process, named L1, has been password protected or not. You are not familiar with the file system of the new organization. How would you accomplish the task?()A、 by using the STATUS command of the Listener control utilityB、 by using the STATUS L1 command of the Listener control utilityC、 by using the SHOW RULES command of the Listener control utilityD、 by using the SET PASSWORD command of the Listener control utilityE、 by searching for the PASSWORD_LISTENER entry in the listener.ora file
You observe that the senior database administrator always uses the following command when connecting to Recovery Manager (RMAN), and then starts executing commands to backup the database files: $ rman target / What would be the effect of this command?()A、RMAN would use the current operating system location to place the backup.B、RMAN would use the control file of the target database to maintain the backup.C、RMAN would use the recovery catalog of the target database to maintain the backup.D、RMAN would use the control file of the target database to maintain the backup metadata. E、RMAN would use the recovery catalog of the target database to maintain the backup metadata.
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Dworks in the instance. The Dworks database has a table named Orderthings. According to the company requirement, you have to export all data from the Orderthings table to a file. During the export, you must make sure that the data export process is saved for reuse and a Microsoft Office Open XML document format is used. What should you do?() A、You should run the bulk copy program utility along with an output file and no format fileB、You should run the SQLCmd utility and save the output to a fileC、You should run the SQL Import and Export Data Wizard and save the output to a file.D、You should run the bulk copy program utility along with a format file and an output file.
You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. You utilize the SP:Recompile event class to run SQL Server Profiler. You find that a great amount of recompiles occurring. The possible causes of the large number of recompiles should be identified. From the flowing four options, which one is the most possible cause of the problem?()A、The sp_executesql batches are not being recovered from the procedure cache.B、A database administrator executed UPDATE STATISTICS statements on all tables, and the most common stored procedures reference all the tables.C、One new stored procedure is created by a database administrator.D、Ad hoc batches are not being recovered from the procedure cache.
Your company has a single Active Directory domain. You have 30 database servers that run Windows Server 2008 R2. The computer accounts for the database servers are stored in an organizational unit (OU) named Data. The user accounts for the database administrators are stored in an OU named Admin. The database administrators are members of a global group named D_Admins. You must allow the database administrators to perform administrative tasks on the database servers. You must prevent the database administrators from performing administrative tasks on other servers. What should you do?()A、Deploy a Group Policy to the Data OU.B、Deploy a Group Policy to the Admin OU.C、Add D_Admins to the Domain Admins global group.D、Add D_Admins to the Server Operators built-in local group.
You are the administrator of a Microsoft Windows Server 2003 computer named Server1. SQL Server 2005 is installed on Server1 to host a database named MedDB. The MedDB database serves as the backend database for a new client/server application named MedDATA. Installation of the MedDATA application creates the database schema, application roles, and administrative accounts. It also sets all of the default permissions. You need to establish a permissions baseline for all objects in the MedDB database. What should you do?()A、Use the SQL Server 2005 Management Studio to review the permissions of the default database objects.B、Query the sys.server_permissions table on Server1.C、Execute the sp_helplogins system stored procedure for each of the default users that the MedDATA application creates.D、Query the sys.database_permissions and sys.database_principals tables in the MedDB database.
Your network contains an Exchange Server 2010 Mailbox server.The server has one mailbox database.A user named User1 reports that he has multiple corrupted e-mail messages in his mailbox.You need to recover User1ˉs -mail messages.The solution must not delete any other e-mail messages in the mailbox database.What should you do?()A、Create a new Mailbox Recovery Database, restore a backup of the database file, and then run the Export-Mailbox cmdlet.B、Create a new Mailbox Recovery Database, restore a backup of the database file, and then run the Restore-Mailbox cmdlet.C、Create a database availability group (DAG), restore a backup of the mailbox database file, and then run the Restore-Mailbox cmdlet.D、Create a database availability group (DAG), restore a backup of the mailbox database file, and then run the Export-Mailbox cmdlet.
单选题You observe that the senior database administrator always uses the following command when connecting to Recovery Manager (RMAN), and then starts executing commands to backup the database files: $ rman target / What would be the effect of this command?()ARMAN would use the current operating system location to place the backup.BRMAN would use the control file of the target database to maintain the backup.CRMAN would use the recovery catalog of the target database to maintain the backup.DRMAN would use the control file of the target database to maintain the backup metadata. ERMAN would use the recovery catalog of the target database to maintain the backup metadata.
单选题You observe that the senior database administrator always uses the following command when connecting to Recovery Manager (RMAN), and then starts executing commands to backup the database files: % rman target / What would be the effect of this command?()A RMAN would use the current operating system location to place the backup.B RMAN would use the control file of the target database to maintain the backup.C RMAN would use the recovery catalog of the target database to maintain the backup.D RMAN would use the control file of the target database to maintain the backup metadata.E RMAN would use the recovery catalog of the target database to maintain the backup metadata.
单选题A database administrator would like to examine repartitioning options for a partitioned database named PRODDB. A workload has been captured on the system (Windows) and is stored in a file named WORKLOAD.SQL. What is the proper command to run the Design Advisor so that it will evaluate the information stored in the file and give advice on re-partitioning?()Adb2advis -d proddb -i workload.sql -P Bdb2advis -d proddb -i workload.sql -partitioning Cdb2advis -d proddb -i workload.sql -m P Ddb2advis -d proddb -i workload.sql -m ALL
单选题While installing an application, the administrator is instructed to perform two final tasks prior to starting the application: 1.Set the ownership of a file named ’control_file’ to be owned by the user ’database’ and the group ’appsrvr’. 2.Change the permissions of ’control_file’ to 0766. After these two tasks have been completed, what will the file permissions look like when ’ls -l control_file’ is executed?()A-rwxrw-rw- 1 database appsrvr 4913 Mar 17 08:24 control_fileB-rw-r--r-- 1 appsrvr database 4913 Mar 17 08:24 control_fileC-rw-r--r-- 1 database appsrvr 4913 Mar 17 08:24 control_fileD-rwxrw-rw- 1 appsrvr database 4913 Mar 17 08:24 control_file
单选题You work as a database administrator for Supportcenter.cn. Your database is in NOARCHIVELOG mode. The database has been configured with three redo logs groups, and there have been five log switches. You lost one non-system-critical data file from your database. Which method would you use to recover the data file?()ARestore all the data files and open the databaseBCreate the data file and perform tablespace recoveryCNo need to restore any file, just recover the databaseDRestore only the system data file and recover the databaseERestore only lost date file and performtablespacerecovery
单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Service in the instance. There is a database user who is named ServiceGreatUser. A SQL Server login named ServiceGreatLogin maps to ServiceGreatUser in the Service database. According to the requirement of the company CIO, the database user can only perform the two tasks below: the database user executes all stored procedures that currently exist in the Sales database and executes all stored procedures that will be created in the Sales database. So what should you do to ensure this? ()AServiceGreatUser should be added to the appropriate fixed database roles. BYou should assign the appropriate object-level permissions to ServiceGreatUser CYou should assign the appropriate server-level permissions to ServiceGreatLogin DYou should assign the appropriate database-level permissions to ServiceGreatUser
单选题You are the administrator of a Microsoft Windows Server 2003 computer named Server1. SQL Server 2005 is installed on Server1 to host a database named MedDB. The MedDB database serves as the backend database for a new client/server application named MedDATA. Installation of the MedDATA application creates the database schema, application roles, and administrative accounts. It also sets all of the default permissions. You need to establish a permissions baseline for all objects in the MedDB database. What should you do?()AUse the SQL Server 2005 Management Studio to review the permissions of the default database objects.BQuery the sys.server_permissions table on Server1.CExecute the sp_helplogins system stored procedure for each of the default users that the MedDATA application creates.DQuery the sys.database_permissions and sys.database_principals tables in the MedDB database.
单选题Your company has a single Active Directory domain. You have 30 database servers that run Windows Server 2008 R2. The computer accounts for the database servers are stored in an organizational unit (OU) named Data. The user accounts for the database administrators are stored in an OU named Admin. The database administrators are members of a global group named D_Admins. You must allow the database administrators to perform administrative tasks on the database servers. You must prevent the database administrators from performing administrative tasks on other servers. What should you do?()ADeploy a Group Policy to the Data OU.BDeploy a Group Policy to the Admin OU.CAdd D_Admins to the Domain Admins global group.DAdd D_Admins to the Server Operators built-in local group.
单选题You work as a database administrator for Certkiller .com. You added atablespaceto your database. Because of the changes to the physical structure of your database, you performed a backup of the control file to trace. After this, you lost only the control files and the instance aborted due to a hardware failure. How would you proceed to recover the database?()AStart the instance and open the database, instance recovery automatically recovers control files BCreate a file based on the contents of the trace file and save it to the control file locations and start the database CRe-create the database (The recovery of the control file is not possible because you have lost all the control files.) DStart the instance, in the NOMOUNTstate,re-create the control file using the CREATE CONTROLFILE command stored in the trace file. EStart the instance and MOUNT the database, then re-create the control file using the CREATE CONTROLFILE command stored in the trace file.
单选题You were recently hired by an organization as a database administrator. You are asked to find out whether the currently functional listener process, named L1, has been password protected or not. You are not familiar with the file system of the new organization. How would you accomplish the task?()Aby using the STATUS command of the Listener control utilityBby using the STATUS L1 command of the Listener control utilityCby using the SHOW RULES command of the Listener control utilityDby using the SET PASSWORD command of the Listener control utilityEby searching for the PASSWORD_LISTENER entry in the listener.ora file
单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Dworks in the instance. The Dworks database has a table named Orderthings. According to the company requirement, you have to export all data from the Orderthings table to a file. During the export, you must make sure that the data export process is saved for reuse and a Microsoft Office Open XML document format is used. What should you do?()AYou should run the bulk copy program utility along with an output file and no format fileBYou should run the SQLCmd utility and save the output to a fileCYou should run the SQL Import and Export Data Wizard and save the output to a file.DYou should run the bulk copy program utility along with a format file and an output file.
单选题An administrator has added a new device to a system and wants to determine if it has been correctly added to the ODM database. Which command would the system administrator use?()AodmgetBodmaddCodmshowDodmcreate
单选题Your network contains an Exchange Server 2010 Mailbox server.The server has one mailbox database.A user named User1 reports that he has multiple corrupted e-mail messages in his mailbox.You need to recover User1ˉs -mail messages.The solution must not delete any other e-mail messages in the mailbox database.What should you do?()ACreate a new Mailbox Recovery Database, restore a backup of the database file, and then run the Export-Mailbox cmdlet.BCreate a new Mailbox Recovery Database, restore a backup of the database file, and then run the Restore-Mailbox cmdlet.CCreate a database availability group (DAG), restore a backup of the mailbox database file, and then run the Restore-Mailbox cmdlet.DCreate a database availability group (DAG), restore a backup of the mailbox database file, and then run the Export-Mailbox cmdlet.