网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
You want a record of all queries that are not using indexes. How would you achieve this?()
A
By enabling the Slow Query Log because all queries that are not using indexes will be logged automatically
B
By enabling the Error Log because not using indexes is an error
C
By enabling the Slow Query Log and using the – log-queries-not-using-indexes option
D
By enabling the Error Log and using the – log-queries-not-using-indexes option
参考答案
参考解析
解析:
暂无解析
更多 “单选题You want a record of all queries that are not using indexes. How would you achieve this?()A By enabling the Slow Query Log because all queries that are not using indexes will be logged automaticallyB By enabling the Error Log because not using indexes is an errorC By enabling the Slow Query Log and using the – log-queries-not-using-indexes optionD By enabling the Error Log and using the – log-queries-not-using-indexes option” 相关考题
考题
You want to schedule a job to rebuild all indexes on the SALES table after the completion of a bulk load operation. The bulk load operation must also be a scheduled job that executes as soon as the first file that contains data arrives on the system.How would you create these jobs?()A. Create both jobs by using events raised by the schedulerB. Create both jobs by using events raised by the applicationC. Create a job to rebuild indexes by using events arised by the application and then create another job to perform bulk load by using events raised by the schedulerD. Create a job to rebuild indexes by using events arised by the Scheduler and then create another job to perform bulk load by using events raised by the application
考题
You are the administrator of a SQL Server 2000 computer. The server is configured as shown in the Database Server Configuration exhibit.You need to create a new database named Inventory. Employees in your company will use the Inventory database to track inventory data. Users will require immediate responses to queries that help them locate where parts are stored. The tables in the database will be configured as shown in the Database Schema exhibit.The database will consume 14 GB of disk space. You must configure the data files and transaction log to accelerate query response time.Which two courses of action should you take? (Each correct answer represents part of the solution. Choose two.)A. On drive C, create a transaction log.On drive D, create a data file in the PRIMARY filegroup.On drive E, create a data file in the SECONDARY filegroup.B. On each drive, create a transaction log.On each drive, create a data file in the PRIMARY filegroup.C. On drive D, create a transaction log.On drive E, create a data file in the PRIMARY filegroup.D. On the PRIMARY filegroup, create all tables and all indexes.E. On the PRIMARY filegroup, create all tables. On the SECONDARY filegroup, create all indexes.F. On the PRIMARY filegroup, create the Parts table and its indexes.On the SECONDARY filegroup, create all other tables and their indexes.
考题
You want to use the Flashback Transaction Query feature to identify all the changes made to your database within a specific time period. What is a prerequisite for using the Flashback Transaction Query feature?()A、 You must use automatic undo management in the database.B、 You must configure OMF in your database.C、 You must configure ASM for storing the datafiles.D、 You must multiplex the online redo log file.
考题
Which information would you find using the CLI help function?()A、message of the dayB、tip of the dayC、explanation for specific system log error messagesD、explanation for specific traceoptions log messages
考题
You want to schedule a job to rebuild all indexes on the SALES table after the completion of a bulk load operation. The bulk load operation must also be a scheduled job that executes as soon as the first file that contains data arrives on the system. How would you create these jobs?()A、Create both jobs by using events raised by the schedulerB、Create both jobs by using events raised by the applicationC、Create a job to rebuild indexes by using events arised by the application and then create another job to perform bulk load by using events raised by the schedulerD、Create a job to rebuild indexes by using events arised by the Scheduler and then create another job to perform bulk load by using events raised by the application
考题
You have recovered your Oracle Database 10g by using the control file backup because all copies of the current control file have been lost due to a media failure. You open your database by using the following statement: SQLALTER DATABASE OPEN RESETLOGS; Which of the following options is true about using the RESETLOGS option?()A、 The log sequence is reset to 0.B、 All the online redo logs are deleted.C、 All the archived redo logs from a previous incarnation become useless.D、 The full database backup taken from a previous incarnation can be used in future.E、 Only the control file and online redo log files are updated with a new RESETLOGS SCN and time stamp.
考题
You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis. How would you achieve this?()A、by using triggersB、by using external tablesC、by using anonymous PL/SQL blocksD、by auditing all DML operations on the table
考题
For the V$SESSION_LONGOPS view, you find that some of the database users have long-running queries that consume a lot of CPU time. This causes performance problems for other users in the database, who have much shorter queries. You would like to make sure that the users with large queries do not use all the CPU time, but you still do not want to terminate them with an error message. Which method would you follow to achieve this?()A、 Set the CPU time per call in the users profile.B、 Set the CPU time per session in the users profile.C、 Set the CPU levels for the user’s group using Resource Manager.D、 Set the TIMED_STATISTICS parameter to TRUE in the parameter file.
考题
You have many users complaining about slow inserts into a large table. While investigating the reason, you find that the number of indexes on the table is high. You want to find out which indexes are not being used. Which method would you follow to achieve this?()A、enable index monitoring and query the DBA_OBJECTS viewB、enable index monitoring and query the DBA_INDEXES viewC、enable index monitoring and query the V$OBJECT_USAGE viewD、enable index monitoring and view the DBA_INDEXTYPE_COMMENTS view
考题
You are using replication and the binary log files on your master server consume a lot of disk space. Which two steps should you perform to safely remove some of the older binary log files?()A、Use the command PURGE BINARY LOGS and specify a binary log file name or a date and time to remove unused filesB、Execute the PURGE BINARY LOGE NOT USED commandC、Remove all of the binary log files that have a modification date earlier than todayD、Edit the .index file to remove the files you want to deleteE、Ensure that none of the attached slaves are using any of the binary logs you want to delete
考题
From the V$SESSION_LONGOPS view, you find that some of the database users have long-running queries that consume a lot of CPU time. This causes performance problems for other users in the database, who have much shorter queries. You would like to make sure that the users with large queries do not use all the CPU time, but you still do not want to terminate them with an error message. Which method would you follow to achieve this?()A、set the CPU time per call in the users profileB、set the CPU time per session in the users profilesC、set the CPU levels for the users’ group using Resource ManagerD、set the TIMED_STATISTICS parameter to TRUE in the parameter file
考题
You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. The users report the slow performance of a SQL Server 2005 application. You are required to identify the queries which perform slowly because of blocking. Which action should you perform?()A、In a SQL Trace log file, you should look for queries with low duration values and high read and write values.B、In a query execution plan, you should look for queries with missing or out-of-date statistics.C、In a SQL Trace log file, you should look for queries with high duration values and low read and write values.D、In a query execution plan, you should look for queries with a large number of table scans.
考题
You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS. You need to collect information about which users are connecting to the Web site by using HTTPS. What should you do?()A、Check the application log on the Web server.B、Use Network Monitor to capture network traffic on the Web server.C、Review the log files created by IIS on the Web server.D、Configure a performance log to capture all Web service counters. Review the performance log data.
考题
You want users to log on to Active Directory by using a new Principal Name (UPN). You need to modify the UPN suffix for all user accounts. Which tool should you use()A、DsmodB、NetdomC、RedirusrD、Active Directory Domains and Trusts
考题
单选题You want a record of all queries that are not using indexes. How would you achieve this?()A
By enabling the Slow Query Log because all queries that are not using indexes will be logged automaticallyB
By enabling the Error Log because not using indexes is an errorC
By enabling the Slow Query Log and using the – log-queries-not-using-indexes optionD
By enabling the Error Log and using the – log-queries-not-using-indexes option
考题
单选题You have a domain controller that runs Windows Server 2008 and is configured as a DNS server You need to record all inbound DNS queries to the server. What should you configure in the DNS Manager console()A
Enable debug logging.B
Enable automatic testing for simple queries.C
Enable automatic testing for recursrve queries.D
Configure event logging to log errors and warnings.
考题
单选题You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. The users report the slow performance of a SQL Server 2005 application. You are required to identify the queries which perform slowly because of blocking. Which action should you perform?()A
In a SQL Trace log file, you should look for queries with low duration values and high read and write values.B
In a query execution plan, you should look for queries with missing or out-of-date statistics.C
In a SQL Trace log file, you should look for queries with high duration values and low read and write values.D
In a query execution plan, you should look for queries with a large number of table scans.
考题
单选题You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS. You need to collect information about which users are connecting to the Web site by using HTTPS. What should you do?()A
Check the application log on the Web server.B
Use Network Monitor to capture network traffic on the Web server.C
Review the log files created by IIS on the Web server.D
Configure a performance log to capture all Web service counters. Review the performance log data.
考题
单选题You have a public computer that runs Windows XP Professional. All users log on to the computer by using the same user account. You log on to the computer by using the local administrator account and attempt to access a secure Web site. You discover that you have automatically logged on to the secure Web site by using the credential of another user. You need to connect to the secure Web site by using your own credentials. What should you do?()A
Run ipconfig /flushdns at the command prompt. B
Reset the password for the local administrator user account. C
From the Internet Options in Internet Explorer, clear the AutoComplete history.D
From the Internet Options in Internet Explorer, delete the Temporary Internet Files.
考题
单选题You want users to log on to Active Directory by using a new Principal Name (UPN). You need to modify the UPN suffix for all user accounts. Which tool should you use()A
DsmodB
NetdomC
RedirusrD
Active Directory Domains and Trusts
考题
单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis. How would you achieve this?()A
by using triggersB
by using external tablesC
by using anonymous PL/SQL blocksD
by auditing all DML operations on the table
考题
单选题You have many users complaining about slow inserts into a large table. While investigating the reason, you find that the number of indexes on the table is high. You want to find out which indexes are not being used. Which method would you follow to achieve this?()A
enable index monitoring and query the DBA_OBJECTS viewB
enable index monitoring and query the DBA_INDEXES viewC
enable index monitoring and query the V$OBJECT_USAGE viewD
enable index monitoring and view the DBA_INDEXTYPE_COMMENTS view
考题
单选题From the V$SESSION_LONGOPS view, you find that some of the database users have long/x7frunning queries that consume a lot of CPU time. This causes performance problems for other users in the database, who have much shorter queries. You would like to make sure that the users with large queries do not use all the CPU time, but you still do not want to terminate them with an error message. Which method would you follow to achieve this?()A
set the CPU time per call in the users profileB
set the CPU time per session in the users profilesC
set the CPU levels for the users’ group using Resource ManagerD
set the TIMED_STATISTICS parameter to TRUE in the parameter file
考题
单选题For the V$SESSION_LONGOPS view, you find that some of the database users have long-running queries that consume a lot of CPU time. This causes performance problems for other users in the database, who have much shorter queries. You would like to make sure that the users with large queries do not use all the CPU time, but you still do not want to terminate them with an error message. Which method would you follow to achieve this?()A
Set the CPU time per call in the users profile.B
Set the CPU time per session in the users profile.C
Set the CPU levels for the user’s group using Resource Manager.D
Set the TIMED_STATISTICS parameter to TRUE in the parameter file.
考题
单选题You want to schedule a job to rebuild all indexes on the SALES table after the completion of a bulk load operation. The bulk load operation must also be a scheduled job that executes as soon as the first file that contains data arrives on the system. How would you create these jobs?()A
Create both jobs by using events raised by the schedulerB
Create both jobs by using events raised by the applicationC
Create a job to rebuild indexes by using events arised by the application and then create another job to perform bulk load by using events raised by the schedulerD
Create a job to rebuild indexes by using events arised by the Scheduller and then create another job to perform bulk load by using events raised by the application
考题
单选题You want users to log on to Active Directory by using a new User Principal Name (UPN). You need to modify the UPN suffix for all user accounts. Which tool should you use()A
DsmodB
NetdomC
RedirusrD
Active Directory Domains and Trusts
考题
单选题Users complain about the slow response time of queries. While investigating the cause you find that the Oracle Instance is not configured to cache all of the data blocks to satisfy the users’queries. Which component of the Oracle Instance would you change to improve performance?()A
Java poolB
Large poolC
Shared poolD
Streams poolE
Library cacheF
Redo log bufferG
Data dictionary cacheH
Database buffer cache
考题
单选题You want to schedule a job to rebuild all indexes on the SALES table after the completion of a bulk load operation. The bulk load operation must also be a scheduled job that executes as soon as the first file that contains data arrives on the system. How would you create these jobs?()A
Create both jobs by using events raised by the schedulerB
Create both jobs by using events raised by the applicationC
Create a job to rebuild indexes by using events arised by the application and then create another job to perform bulk load by using events raised by the schedulerD
Create a job to rebuild indexes by using events arised by the Scheduller and then create another job to perform bulk load by using events raised by the application
热门标签
最新试卷