网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A user executes the statement; PURGE BINARY LOGS TO 'mysql-bin.010'; What is the result?()
A

It deletes all binary log files, except 'mysql-in.010'

B

It deletes all binary log files up to and including 'mysql-bin.010'

C

It deletes all binary log files before 'mysql-bin.010'

D

It deletes all binary log files after 'mysql-bin.010'


参考答案

参考解析
解析: 暂无解析
更多 “单选题A user executes the statement; PURGE BINARY LOGS TO 'mysql-bin.010'; What is the result?()A It deletes all binary log files, except 'mysql-in.010'B It deletes all binary log files up to and including 'mysql-bin.010'C It deletes all binary log files before 'mysql-bin.010'D It deletes all binary log files after 'mysql-bin.010'” 相关考题
考题 The Oracle Database 11g database is running in the ARCHIVELOG mode. The archived redo log files are stored on three locations. The Flash Recovery Area is one of the locations. The details are given below:Which statement is true regarding what this command accomplishes?()A. All archived redo log files backed up at least twice to tape are deleted.B. All archived redo log files backed up at least once to tape are eligible for deletion.C. All archived redo log files backed up at least twice to tape are deleted from the flash recovery area.D. All archived redo log files in local archiving destinations and the flash recovery area backed up at least twice to tape are eligible for deletion.

考题 A user executes the statement;PURGE BINARY LOGS TO ‘mysql-bin.010‘;What is the result?() A.It deletes all binary log files, except ‘mysql-in.010‘B.It deletes all binary log files up to and including ‘mysql-bin.010‘C.It deletes all binary log files before ‘mysql-bin.010‘D.It deletes all binary log files after ‘mysql-bin.010‘

考题 A general purpose MySQL instance is configured with the following options:—log-slow-queries—long-query-time=,0001—log-slow-admin-queries—general-log—log-bin—binlog-format=STATEMENT—innodb-flush-log-at-trx-commit=1Which three statements are true()。A.The General Query Log records more data than the Binary LogB.The binary Log records more data than the General Query LogC.The Slow Query Log records more data than the General Query LogD.The General Query Log records more data than the Slow Query LogE.The Slow Query Log records more data than the Binary LogF.The Binary Log records more data than the Slow Query Log

考题 Which two are correct steps in taking a binary backup of MyISAM tables?() A.Always stop the server prior to the backupB.Stop the server or lock the tables prior to the backupC.Stop the server or lock the databases prior to the backupD.Make a copy of the .frm, .myd, and the .myi filesE.Make a copy of the binary log and tablespace files

考题 Which statement is true about FLUSH LOGS command?() A.It requires the RELOAD, FILE, and DROP privilegesB.It closes and reopens all log filesC.It closes and sends binary log files to slave serversD.It flushes dirty pages in the buffer pool to the REDO logs

考题 You are using replication and the binary log files on your master server consume a lot of disk space. Which two steps should you perform to safely remove some of the older binary log files?() A.Use the command PURGE BINARY LOGS and specify a binary log file name or a date and time to remove unused filesB.Execute the PURGE BINARY LOGE NOT USED commandC.Remove all of the binary log files that have a modification date earlier than todayD.Edit the .index file to remove the files you want to deleteE.Ensure that none of the attached slaves are using any of the binary logs you want to delete

考题 The instance abnormally terminates because of a power outage.  Which statement is true about redo log filesduring instance recovery()A、Inactive and current redo log files are required to accomplish recovery.B、Online and archived redo log files are required to accomplish instance recovery.C、All redo log entries after the last checkpoint are applied from redo log files to data files.D、All redo log entries recorded in the current redo log file until the checkpoint position are applied to data files

考题 Which two are correct steps in taking a binary backup of MyISAM tables?()A、Always stop the server prior to the backupB、Stop the server or lock the tables prior to the backupC、Stop the server or lock the databases prior to the backupD、Make a copy of the .frm, .myd, and the .myi filesE、Make a copy of the binary log and tablespace files

考题 A general purpose MySQL instance is configured with the following options: —log-slow-queries —long-query-time=,0001 —log-slow-admin-queries —general-log —log-bin —binlog-format=STATEMENT —innodb-flush-log-at-trx-commit=1 Which three statements are true()。A、The General Query Log records more data than the Binary LogB、The binary Log records more data than the General Query LogC、The Slow Query Log records more data than the General Query LogD、The General Query Log records more data than the Slow Query LogE、The Slow Query Log records more data than the Binary LogF、The Binary Log records more data than the Slow Query Log

考题 You are using Oracle Database 10g. You performed an  incomplete recovery of your database and opened the database with the RESETLOGS option.  What is the effect of opening the database with the RESETLOGS option?()A、This operation resets the SCN for the database.B、This operation creates a new incarnation of the database.C、This operation moves all the redo log files to a different location.D、This operation deletes the old redo log files and creates new redo log files.E、This operation updates all current datafiles and online redo logs and all subsequent archived redo logs with a new RESETLOGS SCN and time stamp.

考题 A user executes the statement; PURGE BINARY LOGS TO 'mysql-bin.010'; What is the result?()A、It deletes all binary log files, except 'mysql-in.010'B、It deletes all binary log files up to and including 'mysql-bin.010'C、It deletes all binary log files before 'mysql-bin.010'D、It deletes all binary log files after 'mysql-bin.010'

考题 You are using replication and the binary log files on your master server consume a lot of disk space. Which two steps should you perform to safely remove some of the older binary log files?()A、Use the command PURGE BINARY LOGS and specify a binary log file name or a date and time to remove unused filesB、Execute the PURGE BINARY LOGE NOT USED commandC、Remove all of the binary log files that have a modification date earlier than todayD、Edit the .index file to remove the files you want to deleteE、Ensure that none of the attached slaves are using any of the binary logs you want to delete

考题 In which situation will you run the script containing the following statement?()   CREATE CONTROLFILE REUSE DATABASE SALES NORESETLOGS ARCHIVELOG        MAXLOGFILES 20        MAXLOGMEMBERS 3        MAXDATAFILES 30        MAXINSTANCES 10        MAXLOGHISTORY 1200        LOGFILE        GROUP 1 (   ’/disk1/prod/orders/db/log1a.dbf’,        ’/disk2/prod/orders/db/log1b.dbf’        )SIZE 100K        GROUP 2 (   ’/disk1/prod/orders/db/log2a.dbf’,        ’/disk2/prod/orders/db/log2b.dbf’        ) SIZE 100K,        DATAFILE   ’/disk1/prod/orders/db/database1.dbf’,                                           ’/disk2/prod/orders/db/file1.dbf ’;  A、 when all the control files are missing and only a binary backup of the current control file existsB、 when a multiplexed copy of the current control file is missingC、 when all the control files are missing and only an ASCII representation of the binary control file existsD、 when the SPFILE is missing

考题 Which type of database file is spread across all disks in a disk group?()A、 All types of files are spread across all disks in the disk group.B、 DatafilesC、 Redo log filesD、 Archived redo log filesE、 Control files

考题 our database is in the MOUNT state and you execute the following command to open it:  ALTER DATABASE OPEN  What two actions are performed as a result of this command?()A、All control files are opened.B、All redo log files are openedC、The password file is opened.D、The parameter file is opened.E、All online data files are opened.

考题 The instance abnormally terminates because of a power outage. Which statement is true about redolog files during instance recovery()A、Inactive and current redo log files are required to accomplish recovery.B、Online and archived redo log files are required to accomplish instance recovery.C、All redo log entries after the last checkpoint are applied from redo log files to data files.D、All redo log entries recorded in the current redo log file until the checkpoint position are applied to datafiles.

考题 You are working on a database, where you have three redo log groups. When the database is down for a backup, an operating system (OS) user deletes all the redo log files in a group. What will happen when you open your database?()A、 The instance starts, the database is mounted, but efforts to open the database fail, and an error about the missing redo log group is displayed.B、 Before the instance starts, you receive an error about the missing redo log files of a group.C、 The instance starts and the database opens with an error message written to the alert log file.D、 The instance starts and the database opens because two redo log groups still exist.E、 The instance starts and the database opens, but every attempt to write to redo log files fails with an error.

考题 In which scenario will you issue the following command?()      SQL RECOVER DATABASE UNTIL TIME ’2005-10-04 : 12:09:08’ USING        BACKUP CONTROLFILE;A、 when all the control files are missing and only a binary backup of the current control file existsB、 when a multiplexed copy of the current control file is missingC、when all the control files are missing and only a script containing the CREATE CONTROLFILE statement existsD、 when the SPFILE is missing

考题 Which statement is true about FLUSH LOGS command?()A、It requires the RELOAD, FILE, and DROP privilegesB、It closes and reopens all log filesC、It closes and sends binary log files to slave serversD、It flushes dirty pages in the buffer pool to the REDO logs

考题 You have two computers named Computer1 and Computer2. The computers run Windows XP Professional and are joined to an Active Directory domain. Computer1 contains the recovery agent certificate for the domain. A domain user named User1 encrypts files on Computer2 in a folder named C:/User1.  The user leaves the company and the administrator deletes User1’s account. You need to decrypt the files encrypted by User1. What should you do?() A、Log on to Computer2 by using the domain administrator account. At the command prompt, run cipher.exe /u c:/user1/*.*. B、Create a new domain user account named User1. Log on to Computer2 as User1. Modify the properties of the encrypted files. C、Remove Computer2 from the domain. Log on to Computer2 by using the local administrator account. Modify the properties of the encrypted files. D、Back up the encrypted files on Computer2. Restore the files on Computer1. Log on to Computer1 by using the recovery agent account and modify the properties of the encrypted files. 

考题 单选题In which situation will you run the script containing the following statement?()   CREATE CONTROLFILE REUSE DATABASE SALES NORESETLOGS ARCHIVELOG        MAXLOGFILES 20        MAXLOGMEMBERS 3        MAXDATAFILES 30        MAXINSTANCES 10        MAXLOGHISTORY 1200        LOGFILE        GROUP 1 (   ’/disk1/prod/orders/db/log1a.dbf’,        ’/disk2/prod/orders/db/log1b.dbf’        )SIZE 100K        GROUP 2 (   ’/disk1/prod/orders/db/log2a.dbf’,        ’/disk2/prod/orders/db/log2b.dbf’        ) SIZE 100K,        DATAFILE   ’/disk1/prod/orders/db/database1.dbf’,                                           ’/disk2/prod/orders/db/file1.dbf ’;A  when all the control files are missing and only a binary backup of the current control file existsB  when a multiplexed copy of the current control file is missingC  when all the control files are missing and only an ASCII representation of the binary control file existsD  when the SPFILE is missing

考题 单选题Which statement is true about FLUSH LOGS command?()A It requires the RELOAD, FILE, and DROP privilegesB It closes and reopens all log filesC It closes and sends binary log files to slave serversD It flushes dirty pages in the buffer pool to the REDO logs

考题 多选题You are using Oracle Database 10g. You performed an incomplete recovery of your database and opened the database with the RESETLOGS option.  What is the effect of opening the database with the RESETLOGS option? ()AThis operation resets the SCN for the database.BThis operation creates a new incarnation of the database.CThis operation moves all the redo log files to a different location.DThis operation deletes the old redo log files and creates new redo log files.EThis operation updates all current datafiles and online redo logs and all subsequent archived redo logs with a new RESETLOGS SCN and time stamp.

考题 单选题Which type of database file is spread across all disks in a disk group?()A  All types of files are spread across all disks in the disk group.B  DatafilesC  Redo log filesD  Archived redo log filesE  Control files

考题 多选题Which two are correct steps in taking a binary backup of MyISAM tables?()AAlways stop the server prior to the backupBStop the server or lock the tables prior to the backupCStop the server or lock the databases prior to the backupDMake a copy of the .frm, .myd, and the .myi filesEMake a copy of the binary log and tablespace files

考题 单选题You are working on a database, where you have three redo log groups. When the database is down for a backup, an operating system (OS) user deletes all the redo log files in a group. What will happen when you open your database?()A  The instance starts, the database is mounted, but efforts to open the database fail, and an error about the missing redo log group is displayed.B  Before the instance starts, you receive an error about the missing redo log files of a group.C  The instance starts and the database opens with an error message written to the alert log file.D  The instance starts and the database opens because two redo log groups still exist.E  The instance starts and the database opens, but every attempt to write to redo log files fails with an error.

考题 单选题The Oracle Database 11g database is running in the ARCHIVELOG mode. The archived redo log files are stored on three locations. The Flash Recovery Area is one of the locations. The details are given below:   LOG_ARCHIVE_DEST_1 = ’LOCATION = /disk1/archive’ LOG_ARCHIVE_DEST_2 = ’SERVICE = stdb1’ DB_RECOVERY_FILE_DEST = ’/u01/oradata’   Examine the following RMAN command issued to set the deletion policy for archived log files:   RMAN CONFIGURE ARCHIVELOG DELETION POLICY TO BACKED UP 2 TIMES TO sbt; Which statement is true regarding what this command accomplishes?()A  All archived redo log files backed up at least twice to tape are deleted.B  All archived redo log files backed up at least once to tape are eligible for deletion.C  All archived redo log files backed up at least twice to tape are deleted from the flash recovery area.D  All archived redo log files in local archiving destinations and the flash recovery area backed up at least twice to tape are eligible for deletion.