单选题 You want to perform in incomplete recovery of your database. You plan to use these commands to recover your database: SET UNTIL TIME = ’2000-12-09:11:44:00’; RESTORE DATABASE; RECOVER DATABASE; How should the commands be executed? ()
Only the SET command must be within a RUN block.
All commands should be executed at the RMAN prompt.
All three commands must be within a single RUN block.
Only the RESTORE and RECOVER commands must be within a single RUN block.
单选题 You issue this statement:ALTER DATABASE BACKUP CONTROLFILE TO TRACE; What does the statement generate?()
A text copy of the control file.
A binary copy of the control file.
A file containing a SQL statement which will re-create the database.
A file containing a SQL statement which will re-create the control file.
多选题 Examine the code: CREATE ROLE readonly IDENTIFIES USING app.chk_readwrite ; CREATE ROLE readwrite IDENTIFIED USING app.chk_readwrite ; CREATE OR REPLACE PROCEDURE app.chk_readwrite AUTHID CURRENT_USER IS ipchk STRING(30); BEGIN IF sys_context(‘USERENV’,’ISDBA’)=’TRUE’ THEN DBMS_SESSION.SET_ROLE‘READWRITE’) ; ELSE DBMS_SESSION.SET_ROLE(‘READONLY’) ; END; / Which three statements correctly describe the Secure Application role definition?()
No user or application has to remember or hide a password.
It prevents everyone except a true DBA session from acquiring the READWRITE role.
app.chk_readwrite is called whenever a user tries to access rows protected by the READONLY or READWRITE label.
app.chk_readwrite is called by users or applications when they want to enable the READONLY or READWRITE role.
单选题 In the Oracle9i Data Guard architecture, what is the purpose of the Log Transport Services?()
A
B
C
D
单选题 Your company decided to start using RMAN in its backup strategy. Previously your company used operating system file copies. Which command is used to make RMAN aware of existing backups made by copying files at the operating system?()
CHANGE
RESYNC
CATALOG
CROSSCHECK
多选题 In which three cases does a checkpoint occur? ()
Every three minutes.
When a log switch occurs.
When forces by an administrator.
When a tablespace is taken offline normal.
When the redo buffer is one-third full.
单选题 Which of the following files can be used to configure connection pooling in the shared server environment?()
INIT.ORA
SQLNET.ORA
TNSNAMES.ORA
SERVICES.ORA
LISTENER.ORA
单选题 The Log Writer (LGWR) process reads information from the ()and writes it to the online logs.
large pool
shared pool
data buffer cache
redo log buffer
data dictionary cache
多选题 Which three statements are true about database recovery operations?()
Damaged or lost data files are restored from backups.
Redo log file entries are used to roll forward the database.
Undo segments are used to roll back any uncommitted transactions.
Transactions that were active when the failure occurred are restarted.
Transactions that were active when the failure occurred are automatically committed during the recover procedure.
在任何情况下,伸缩调节器处轨距的要求为()。
人类有两套影响学习的记忆系统:陈述性记忆和程序记忆。陈述性记忆是对事实或者词汇之类基本认识的记忆。而程序记忆,就是一个人“不劳而获”的记忆。程序记忆是人养成习惯和习得技巧的方式,比如骑自行车。在很多时候,这种学习是无意识的。人们用早期发育的程序记忆系统来学习复杂的东西,比如语法规则。帮助人们学习词汇的陈述性记忆系统,则需要更多时问完成发育。儿童拥有程序记忆系统,并且不受陈述性记忆系统的干扰。由此可以推出()。
宋末元初四大家
公平目标的实现可以通过()实现。
荟萃分析
人员安全疏散分析的性能判定标准为:可用疏散时间(A.SET)必须()必需疏散时间(RSET)。
预防HIV感染的主要措施应当为( )
简述我国混合型债券市场的发展状况。
造成水中某些污染物在生物体内含量大大高于水体中的浓度的生物放大作用是指()
输血的适应证中,不包括()