网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
After a number of days set by the parameter CONTROL_FILE_RECORD_KEEP_TIME, the information in the control file is overwritten by RMAN. What is this parameter’s default value?()
- A、1 day
- B、5 days
- C、7 days
- D、31 days
参考答案
更多 “After a number of days set by the parameter CONTROL_FILE_RECORD_KEEP_TIME, the information in the control file is overwritten by RMAN. What is this parameter’s default value?()A、1 dayB、5 daysC、7 daysD、31 days” 相关考题
考题
●Let us now see how randomization is done when a collision occurs.After a(71),time is divided into discrete slots whose length is equal to the worst-case round-trip propagation time on the ether(2τ). To accommodate the longest path allowed by Ethernet, the slot time has been set t0 512 bit times, or 51.2μsec.After the first collision, each station waits either 0 or l (72) times before trying again. If two stations collide and each one picks the same random number, they will collide again. After the second collision, each one picks either 0,1,2,or 3 at random and waits that number of slot times. If a third collision occurs (the probability of this happening is 0.25), then the next time the number of slots to wait is chosen at (73) from the interval 0 to 23-1.In general, after i collisions,a random number between 0 and 2i-1 is chosen, and that number of slots is skipped. However, after ten collisions have been reached, the randomization (74) is frozen at a maximum of 1023 slots. After 16 collisions, the controller throws in the towel and reports failure back to the computer. Further recoveryis up to (75 )layers.(71) A.datagramB.collisionc.connectionD. service(72) A.slotB.switchC.processD.fire(73) A.restB.randomC.onceD.odds(74) A.unicastB.multicastC.broadcastD.interval(75) A.localB.nextC.higherD.lower
考题
Wernment , a large number of people____after the flood in 1991.A: survivedB: suspendedC: sufferedD: subfected
考题
What must the Master or person in charge of a ship enter in the logbook after conducting a boat drill?A.Which survival craft was used in the drillB.The number of each lifeboat not lowered during each drillC.Only the number of each motor propelled lifeboat that is loweredD.The length of time an oar propelled lifeboat is rowed
考题
Using FTP passive mode, after the client opens thecommand channel (port 21) to the FTP server and requests passive mode, what will be the next step? ()A、 The FTP server sends back an acknowledgment (ACK) to the clientB、 The FTP server allocates a port touse for the data channel and transmit that port number to the clientC、 The FTP server opens the data channel to the client using the port number indicated by the clientD、 The FTP client opens the data channel to the FTP server on Port 20E、 The FTP client opens the datachannel to the FTP server on Port 21
考题
A team of programmers is reviewing a proposed API for a new utility class.After some discussion, they realize that they can reduce the number of methods in the API without losing any functionality.If they implement the new design, which two principles will they be promoting?()A、Looser couplingB、Tighter couplingC、Lower cohesionD、Higher cohesionE、Weaker encapsulationF、Stronger encapsulation
考题
Which statement is true regarding the Archiver (ARCn) process,archived log files,and recovery? ()A、A database backup, combined with archived redo log files, guarantees that all committed data can be recovered to the point of failure. B、During recovery the ARCn background process copies its redo entries identified for recovery by the control file to the data files. C、After each write to an archived log, the mandatory background process ARCn writes its log sequence number and the first and last SCN number within the log sequence to the control file. D、At database recover time, and archived redo log is uniquely identified for recovery use by its redo thread number and destination ID number retrieved from the control file.
考题
You are maintaining your database in Oracle10g. You are performing an incomplete recovery because the tablespace, DATA1, was dropped and purged from the Recycle Bin. After performing an incomplete recovery, you open the database with the RESETLOGS option. What will NOT be the impact of using the RESETLOGS option?()A、 The log sequence for the database will restart from 1.B、 The log sequence number will be written to the control file.C、 The log sequence number will be written to the datafile headers.D、 The log sequence number will be written to the initialization parameter file.
考题
After using the alt_disk_install command to clone a system image to another disk, the system administrator noticed a large number of defined devices not allocated to the LPAR. Which of the following is the most likely cause of this situation?()A、The cfgmgr command was not run to reconfigure the devicesB、The machine was not booted into SMS MultiBoot mode after configurationC、The machine was not in full system partition mode when the volume was createdD、The alt_disk_install command was not run with the -O option to remove references in the ODM
考题
Which attribute of a JFS filesystem can NOT be changed after the filesystem is created?()A、The size of the filesystemB、The placement of the filesystemC、The mount point of the filesystemD、The number of bytes per inode
考题
Your database initialization parameter file has the following entry: SEC_MAX_FAILED_LOGIN_ATTEMPTS=3 Which statement is true regarding this setting?()A、 It drops the connection after the specified number of login attempts fail for any user.B、 It is enforced only if the password profile is enabled for the user.C、 It locks the user account after the specified number of attempts.D、 It drops the connection after the specified number of login attempts fail only for users who have the SYSDBA privilege.
考题
Which statement is true regarding this setting?()A、It drops the connection after the specified number of login attempts fail for any user.B、It is enforced only if the password profile is enabled for the user. C、It locks the user account after the specified number of attempts. D、It drops the connection after the specified number of login attempts fail only for users who have the SYSDBA privilege.
考题
单选题Which attribute of a JFS filesystem can NOT be changed after the filesystem is created?()A
The size of the filesystemB
The placement of the filesystemC
The mount point of the filesystemD
The number of bytes per inode
考题
单选题Aids to navigation marking the intracoastal waterway can be identified by().A
the letters ICW after the aid's number or letterB
yellow stripes,squares,or triangles marked on themC
white retroreflective materialD
the light characteristic and color for lighted aids
考题
单选题Because of a logical corruption in your production database, you wanted to perform Tablespace Point in Time Recovery (TSPITR). But before you start the recovery, you queried the TS_PITR_OBJECTS_TO_BE_DROPPED view and realized that there are a large number of objects that would be dropped when you start the recovery by using this method. You want to preserve these objects. Which option must you use to perform TSPITR and preserve the object?()A
Perform Export before TSPITR and Import after TSPITRB
Move objects to another schema that has the same tablespace assignedC
Perform Incomplete Recovery before TSPITR with the Log Sequence Number (LSN)D
Perform Incomplete Recovery before TSPITR with the System Change Number (SCN)
考题
单选题Which of the following has the least effect on the effectiveness of questions in classes?A
students' language proficiencyB
the number of studentsC
wait-time allowed after a questionD
feedback given to students after they answer the questions
考题
单选题Which of the following has the least effect on the effectiveness of questions in classes?A
Students' language proficiency.B
The number of students.C
Wait-time allowed after a question.D
Feedback given to students after they answer the questions.
考题
单选题Which statement is true regarding this setting?()A
It drops the connection after the specified number of login attempts fail for any user.B
It is enforced only if the password profile is enabled for the user. C
It locks the user account after the specified number of attempts. D
It drops the connection after the specified number of login attempts fail only for users who have the SYSDBA privilege.
考题
单选题Which of the following is NOT a security feature relating to user accounts?()A
Some commands can be password protected requiring logged in customers to re-enter their password.B
A user account can be disabled automatically, after a specified number of invalid login attempts.C
An account can have multiple valid passwords at the same time, any of which can be used to access the account.D
The password policy feature can allow the system to require passwords to include a minimum number of numeric characters.E
Logged in customers can be logged off of the system after a specified period of inactivity.
考题
单选题Which components are needed for successful and most efficient recovery.()A
The backup RB3 and the current online redo log filesB
the backup RB2 and the archived redo log files after the log sequence number 15622C
Backup R81 and the archived redo log hies after the log sequence number 12871D
The backup RB3 and the archived redo log files after the log sequence number 16721
考题
单选题What must the Master or person in charge of a ship enter in the logbook after conducting a boat drill? ()A
Which survival craft was used in the drillB
The number of each lifeboat not lowered during each drillC
Only the number of each motor propelled lifeboat that is loweredD
The length of time an oar propelled lifeboat is rowed
考题
单选题You query the ORDERS table and discover that order number 1101 is missing. One of your reports, generated at 5:00 A.M. on April 23, 2005 using Oracle Reports, includes this order number in the output. You have inserted 100 new orders into the ORDERS table since generating this report. Which flashback technology would you use to recover order number 1101 into the ORDERS table without losing the 100 orders that you added after the report was generated?()A
Flashback TableB
Flashback QueryC
Flashback Version QueryD
Flashback Transaction Query
考题
多选题Immediately after adding a new disk to or removing an existing disk from an Automatic Storage Management (ASM) instance, you find that the performance of the database decreases initially, until the addition or removal process is completed. Performance then gradually returns to normal levels. Which two activities could you perform to maintain a consistent performance of the database while adding or removing disks?()Aincrease the number of checkpoint processesBdefine the POWER option while adding or removing the disksCincrease the number of DBWR processes by setting up a higher value for DB_WRITER_PROCESSESDincrease the number of slave database writer processes by setting up a higher value for DBWR_IO_SLAVESEincrease the number of ASM Rebalance processes by setting up a higher value for ASM_POWER_LIMIT during the disk addition or removal
考题
单选题After a number of days set by the parameter CONTROL_FILE_RECORD_KEEP_TIME, the information in the control file is overwritten by RMAN. What is this parameter’s default value?()A
1 dayB
5 daysC
7 daysD
31 days
考题
单选题Using FTP passive mode, after the client opens thecommand channel (port 21) to the FTP server and requests passive mode, what will be the next step? ()A
The FTP server sends back an acknowledgment (ACK) to the clientB
The FTP server allocates a port touse for the data channel and transmit that port number to the clientC
The FTP server opens the data channel to the client using the port number indicated by the clientD
The FTP client opens the data channel to the FTP server on Port 20E
The FTP client opens the datachannel to the FTP server on Port 21
考题
单选题A team of programmers is reviewing a proposed API for a new utility class. After some discussion,they realize that they can reduce the number of methods in the API without losing any functionality.If they implement the new design, which two OO principles will they be promoting?()A
Looser couplingB
Tighter couplingC
Lower cohesionD
Higher cohesionE
Weaker encapsulationF
Stronger encapsulation
考题
单选题A client is experiencing issues after cloning an LPAR using alt_disk_install. DLPAR functions are not available for the new LPAR. Also, there is a lot of network traffic to the HMC. What is the most probable cause of this problem?()A
DLPAR functions are not available for cloned partitionsB
The new partition has the same node number as the original LPARC
Additional filesets need to be reinstalled after the alt_disk_install cloningD
The speed and duplex settings on the Ethernet adapter on the new LPAR is misconfigured
考题
单选题If there are a number of survivors in the water after abandoning ship,they should().A
tie themselves to the unit so they won't drift with the currentB
form a small circular group to create a warmer pocket of water in the center of the circleC
send the strongest swimmer to shore for assistanceD
form a raft by lashing their life preservers together
考题
单选题The number of visits after 4 months is closest to ______% of the number of visits after 1 month.A
40B
45C
90D
105E
110
热门标签
最新试卷