随笔分类 - OCP
OCP考试学习
摘要:A user, who is authenticated externally, logs in to a remote machine and connects to the databaseinstance. What action would you take to ensure that a
阅读全文
摘要:Some non-DBA users in your database have been granted ANY TABLE system privileges and theyare able to access data dictionary base tables. You decide t
阅读全文
摘要:Your database instance is running with full workload after database creation. You have decided to use a fixed-size undo tablespace. You want to use th
阅读全文
摘要:Which statement is true about the UNDO_RETENTION parameter when retention guarantee is not enabled?A.It is the time period after which the undo data b
阅读全文
摘要:In which situation may the UNDO_RETENTION parameter be ignored, even if it is set to a value?A. When the data file of the undo tablespace is autoexten
阅读全文
摘要:View the Exhibit and examine the undo tablespace attributes. Your database instance is experiencing a large volume of transactions from non-DBA users
阅读全文
摘要:Which two statements are true regarding undo tablespaces? (Choose two.)A.The database can have more than one undo tablespace.B.The UNDO_TABLESPACE par
阅读全文
摘要:Which three operations require undo data? (Choose three.)A.committing a transactionB.flashing back a transaction – 回退操作C.recovering a failed transacti
阅读全文
摘要:Which two statements correctly describe the relation between a data file and the logical databasestructures? (Choose two.)A.An extent cannot spread ac
阅读全文
摘要:Identify the logical structure that will never have more than one data segment created for it.A.external tableB.partitioned tableC.partitioned indexD.
阅读全文
摘要:You have set Tablespace Full Metrics Threshold values for the USERS tablespace as follows:Warning (%): 90Critical (%): 95Which background process is r
阅读全文
摘要:16.Note the following functionalities of various background processes:1: Record the checkpoint information in data file headers.--CKPT2: Perform recov
阅读全文
摘要:Which two statements are true about Shared SQL Area and Private SQL Area? (Choose two.)A. Shared SQL Area will be allocated in the shared poolB. Share
阅读全文
摘要:These are points that describe the contents of different memory components:1: Descriptive information or metadata about schema objects that are querie
阅读全文
摘要:You have executed this command to change the size of the database buffer cache:SQL> ALTER SYSTEM SET DB_CACHE_SIZE=2516582;System altered.To verify th
阅读全文
摘要:Which is the correct description of a pinned buffer in the database buffer cache?A. The buffer is currently being accessedB. The buffer is empty and h
阅读全文
摘要:Identify the memory component from which memory may be allocated for:1: Session memory for the shared server2: Buffers for I/O slaves3: Oracle Databas
阅读全文
摘要:Examine the following statement that is used to modify the primary key constraint on the SALES table:SQL> ALTER TABLE SALES MODIFY CONSTRAINT pk DISAB
阅读全文
摘要:View the Exhibit and examine the privileges granted to the SL_REP user. The EMP table is owned by theSCOTT user. The SL_REP user executes the followin
阅读全文
摘要:Observe the information in the columns:1. The SGA2. The cursor state3. User-session data4. The stack spacea. Text and parsed forms of all SQL statemen
阅读全文
浙公网安备 33010602011771号