zoukankan      html  css  js  c++  java
  • 053(六十)

    296、

    296.You perform the following activities during the database upgrade from Oracle Database 10g to Oracle Database 11g:
    Capture plans for a SQL workload into a SQL Tuning Set (STS) before upgrade. 
    Load these plans from the STS into the SQL plan baseline immediately after the upgrade.
    What is the reason for performing these activities?
    A. to minimize plan regression due to the use of a new optimizer version
    B. to completely avoid the use of new plans generated by a new optimizer version
    C. to prevent plan capturing when the SQL statement is executed after the database upgrade
    D. to keep the plan in the plan history so that it can be used when the older version of the optimizer is used

    297、View the Exhibit for some of the parameter settings. You start a session and issue the following command:

    SQL>CREATE INDEX emp_ename ON emp(ename)
    TABLESPACE users INVISIBLE;
    What is the outcome of the above command?

    A. The index is not used by the optimizer but is maintained during DML operations.
    B. The index is not used by the optimizer and is not maintained during DML operations.
    C. The index is used by the optimizer only if a hint is specified in the query statement and is maintained during DML operations.
    D. The index is used by the optimizer only if a hint is specified in the query statement but is not maintained during DML operations.

    298、

    298.While tuning a SQL statement, the SQL Tuning Advisor finds an existing SQL profile for the statement that has stale statistics available. 
    What would the optimizer do in this situation?
    A. It updates the existing SQL profiles with current statistics.
    B. It makes the statistics information available to GATHER_STATS_JOB. 
    C. It initiates the statistics collection process by running GATHER_STATS_JOB. 
    D. It logs a warning message in the alert log so that the DBA can perform statistics collection manually.

    299、

    299.In your database, the LDAP_DIRECTORY_SYSAUTH initialization parameter has been set to YES and the users 
    who need to access the database as DBAs have been granted SYSDBA enterprise role in Oracle Internet Directory (OID). 
    SSL and the password file have been configured. A user SCOTT with the SYSDBA privilege tries to connect to the database instance from a remote machine using the command:
    $ SQLPLUS scott/tiger@DB01 AS SYSDBA
    where DB01 is the net service name.
    Which authentication method would be used first?
    A. authentication by password file
    B. authentication by using certificates over SSL
    C. authentication by using the Oracle Internet Directory
    D. authentication by using the local OS of the database server

    300、

    300.The following databases are registered in the base recovery catalog: PROD1, PROD2, and PROD3. 
    The database user CATOWNER owns the base recovery catalog. You want a new user VPC1 to have access to only the PROD1 database and create a virtual private catalog.
    Given below are some of the commands required to achieve this:
    1.SQL> GRANT recovery_catalog_owner TO vpc1;
    2.RMAN> CONNECT CATALOG vpc1/password@catdb;
    3.RMAN> GRANT CATALOG FOR DATABASE prod1 TO vpc1;
    4.RMAN> CONNECT CATALOG catowner/password@catdb;
    5.RMAN> CREATE VIRTUAL CATALOG;
    What is the correct sequence in which the commands have to be executed?
    A. 1, 4, 5, 2, 3
    B. 1, 4, 3, 2, 5
    C. 4, 5, 2, 3, 1
    D. 2, 3, 4, 5, 1
    E. 1, 4, 2, 3, 5
  • 相关阅读:
    邦定lua函数到C里做为回调
    cocos2d-x 获取图片的某像素点的RGBA颜色 -转
    地图跟着主角视角滚动
    用 eclipse ndk 编译 cocos2d-x for Android
    cocos2d-x 安卓环境配置 -转
    Hacker(16)----防范端口扫描与嗅探
    Hacker(15)----嗅探原理
    Hacker(14)----扫描目标计算机端口
    Hacker(13)----搜集目标计算机的重要信息
    Hacker(12)----个人计算机安全防护策略
  • 原文地址:https://www.cnblogs.com/huanhuanang/p/5454622.html
Copyright © 2011-2022 走看看