网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which is the correct description of a pinned buffer in the database buffer cache()
A
The buffer is currently being accessed.
B
The buffer is empty and has not been used.
C
The contents of the buffer have changed and must be flushed to the disk by the DBWn process.
D
The buffer is a candidate for immediate aging out and its contents are synchronized with the block contents on the disk.
参考答案
参考解析
解析:
Every buffer has an access mode:pinnedorfree(unpinned). A buffer is "pinned" in the cache so that it does not age out of memory while a user session accesses it. Multiple sessions cannot modify a pinned buffer at the same time.
更多 “单选题Which is the correct description of a pinned buffer in the database buffer cache()A The buffer is currently being accessed.B The buffer is empty and has not been used.C The contents of the buffer have changed and must be flushed to the disk by the DBWn process. D The buffer is a candidate for immediate aging out and its contents are synchronized with the block contents on the disk.” 相关考题
考题
Which of the following is the correct description of the English sound /k/
A voiceless,velar,stopB voiced,velar,stopC voiceless,alveolar,stopD voiced,alveolar,stop
考题
The following commands are available in the Linux binary distributions of Mysql: Mysqld Mysqld_safe Mysql.server What is the correct description of each of these commands?()
A.AB.BC.CD.D
考题
Which statement describes queue and buffer managment in the E-series router?()
A. Buffer memory is managed dynamically in the I/O module.B. Buffer memory is managed dynamically in the switch fabric.C. Buffer memory is managed dynamically on egress line modules.D. Buffer memory is managed dynamically on ingress line modules
考题
Which is the branch of linguistics which studies the characteristics of speech sounds and provides methods for their description, classification and transcription?A.Phonetics
B.Phonology
C.Semantics
D.Pragmatics
考题
Lossless Ethernet for FCoE is achieved through the use of which features?()A、 Priority flow controlB、 Buffer-to-buffer creditsC、 TCP retransmissionD、 Ethernet checksumE、 QoS policies
考题
Which of these is a correct description of SSO?()A、It will only become active after a software failure.B、It will only become active after a hardware failure.C、It requires that Cisco NSF be enabled in order to work successfully.D、It synchronizes the MAC, FIB, and adjacency tables between Active and Standby Route Processors.
考题
Which of these is a correct description of SSO?()A、 It will only become active after a software failure.B、 It will only become active after a hardware failure.C、 It requires that Cisco NSF be enabled in order to work successfully.D、 It synchronizes the MAC·, FIB·, and adjacency tables between Active and Standby RouteProcessors.
考题
Which of the following provides a logical grouping of database objects?()A、ViewB、TableC、SchemaD、Buffer pool
考题
An AIX system administrator needs to adjust the maximum amount of memory that can be pinned. Which of the following commands is used to make the change?()A、 vmtune -MB、 svmon -mC、 vmstat -sD、 schedtune -m
考题
Which statement describes queue and buffer managment in the E-series router?()A、Buffer memory is managed dynamically in the I/O module.B、Buffer memory is managed dynamically in the switch fabric.C、Buffer memory is managed dynamically on egress line modules.D、Buffer memory is managed dynamically on ingress line modules
考题
You noticed that large memory allocations for the Oracle backup and restore operations are causing a performance overhead on the shared pool. Which memory structure would you configure to avoid this performance overhead?()A、 recycle buffer cacheB、 large poolC、 streams poolD、 keep buffer cacheE、 redo log buffer
考题
Which description is correct for a private VLAN community port with respect to Layer 2 communications?() A、 It communicates with all other community ports in the private VLAN domain.B、 It communicates with only isolated ports in the private VLAN domain.C、 It communicates only with other community ports in the same community and associated promiscuous ports.D、 It communicates only with associated promiscuous and isolated ports.
考题
Which description about asymmetric encryption algorithms is correct?()A、They use the same key for encryption and decryption of data.B、They use different keys for decryption but the same key for encryption of data.C、They use different keys for encryption and decryption of data.D、They use the same key for decryption but different keys for encryption of data.
考题
Which of these is a correct description of Stateful Switchover?()A、 It will only become active after a software failureB、 It will only become active after a hardware failureC、 It requires that Cisco N3F· be enabled in order to work successfullyD、 It synchronizes the MAC·, FIB·, and adjacency tables between Active and Standby Route Processors
考题
Which registry variable should be set to keep the buffer pools in memory on AIX and Linux?()A、DB2_KEEP_BP B、DB2_PINNED_BP C、DB2MEMDISCLAIM D、DB2MEMMAXFREE
考题
Which is the correct description of a pinned buffer in the database buffer cache()A、The buffer is currently being accessed.B、The buffer is empty and has not been used.C、The contents of the buffer have changed and must be flushed to the disk by the DBWn process. D、The buffer is a candidate for immediate aging out and its contents are synchronized with the block contents on the disk.
考题
You configured the large pool for Oracle backup and restore operations. As a result, which component would require less memory?()A、 streams poolB、 shared poolC、 log bufferD、 keep buffer cacheE、 recycle buffer cache
考题
Which component of the SGA stores parsed SQL statements is used for process sharing?()A、Buffer cache B、Redo log buffer C、Private SQL area D、Library cache E、Row cache
考题
单选题Which of the following description of the sound segments is NOT correct? _____A
[m]bilabial nasalB
[j]alveolar approximantC
[h]glottal fricativeD
[l]alveolar lateral
考题
单选题You noticed that large memory allocations for the Oracle backup and restore operations are causing a performance overhead on the shared pool. Which memory structure would you configure to avoid this performance overhead?()A
recycle buffer cacheB
large poolC
streams poolD
keep buffer cacheE
redo log buffer
考题
单选题Which is the correct description of a pinned buffer in the database buffer cache()A
The buffer is currently being accessed.B
The buffer is empty and has not been used.C
The contents of the buffer have changed and must be flushed to the disk by the DBWn process. D
The buffer is a candidate for immediate aging out and its contents are synchronized with the block contents on the disk.
考题
单选题Which registry variable should be set to keep the buffer pools in memory on AIX and Linux?()A
DB2_KEEP_BP B
DB2_PINNED_BP C
DB2MEMDISCLAIM D
DB2MEMMAXFREE
考题
单选题Which description is correct for a private VLAN community port with respect to Layer 2 communications?()A
It communicates with all other community ports in the private VLAN domain.B
It communicates with only isolated ports in the private VLAN domain.C
It communicates only with other community ports in the same community and associated promiscuous ports.D
It communicates only with associated promiscuous and isolated ports.
考题
单选题Which background process reads the redo log buffer and writes it to a file?()A
ARCnB
DBWnC
CKPTD
LGWRE
PMONF
SMON
考题
单选题Which of these is a correct description of SSO?()A
It will only become active after a software failure.B
It will only become active after a hardware failure.C
It requires that Cisco NSF be enabled in order to work successfully.D
It synchronizes the MAC, FIB, and adjacency tables between Active and Standby Route Processors.
考题
单选题Which description about asymmetric encryption algorithms is correct?()A
They use the same key for encryption and decryption of data.B
They use different keys for decryption but the same key for encryption of data.C
They use different keys for encryption and decryption of data.D
They use the same key for decryption but different keys for encryption of data.
考题
单选题Which of these is a correct description of Stateful Switchover?()A
It will only become active after a software failureB
It will only become active after a hardware failureC
It requires that Cisco N3F· be enabled in order to work successfullyD
It synchronizes the MAC·, FIB·, and adjacency tables between Active and Standby Route Processors
考题
单选题The following commands are available in the Linux binary distributions of Mysql: Mysqld Mysqld_safe Mysql.server What is the correct description of each of these commands?()A
AB
BC
CD
D
热门标签
最新试卷