移动端

  • 题王微信公众号

    题王微信公众号

    微信搜“题王网”真题密题、最新资讯、考试攻略、轻松拿下考试

计算机考试 | Oracle认证考试

模式切换

0 0 0
我的错题 我的收藏 学习笔记

章节目录

单选题 You want to perform in incomplete recovery of your database.  You plan to use these commands to recover your database:  SET UNTIL TIME = ’2000-12-09:11:44:00’;  RESTORE DATABASE; RECOVER DATABASE;  How should the commands be executed? ()

A

Only the SET command must be within a RUN block.

B

All commands should be executed at the RMAN prompt.

C

All three commands must be within a single RUN block.

D

Only the RESTORE and RECOVER commands must be within a single RUN block.

单选题 You issue this statement:ALTER DATABASE BACKUP CONTROLFILE TO TRACE;  What does the statement generate?()

A

A text copy of the control file.

B

A binary copy of the control file.

C

A file containing a SQL statement which will re-create the database.

D

A file containing a SQL statement which will re-create the control file.

多选题 Examine the code:   CREATE ROLE readonly IDENTIFIES USING app.chk_readwrite ; CREATE ROLE readwrite IDENTIFIED USING app.chk_readwrite ;   CREATE OR REPLACE PROCEDURE app.chk_readwrite  AUTHID CURRENT_USER IS  ipchk STRING(30);  BEGIN  IF sys_context(‘USERENV’,’ISDBA’)=’TRUE’  THEN DBMS_SESSION.SET_ROLE‘READWRITE’) ;  ELSE DBMS_SESSION.SET_ROLE(‘READONLY’) ;  END; /   Which three statements correctly describe the Secure Application role definition?()

A

No user or application has to remember or hide a password. 

B

It prevents everyone except a true DBA session from acquiring the READWRITE role. 

C

app.chk_readwrite is called whenever a user tries to access rows protected by the READONLY or READWRITE label. 

D

app.chk_readwrite is called by users or applications when they want to enable the READONLY or READWRITE role.

多选题 In which three cases does a checkpoint occur? ()

A

Every three minutes.

B

When a log switch occurs.

C

When forces by an administrator.

D

When a tablespace is taken offline normal.

E

When the redo buffer is one-third full.

单选题 The Log Writer (LGWR) process reads information from the ()and writes it to the online logs.

A

large pool

B

shared pool

C

data buffer cache

D

redo log buffer

E

data dictionary cache

多选题 Which three statements are true about database recovery operations?()

A

Damaged or lost data files are restored from backups.

B

Redo log file entries are used to roll forward the database.

C

Undo segments are used to roll back any uncommitted transactions.

D

Transactions that were active when the failure occurred are restarted.

E

Transactions that were active when the failure occurred are automatically committed during the recover procedure.

最新资讯

首页 上一页 1 2 3 4 5 下一页 尾页 /

到第