Core files required for user applications are stored in which of the following locations?()
多选题Your database operates in ARCHIVELOG mode and all the tablespaces are online. Due to a user error, you decided to perform an incomplete recovery. Which two tasks would you be required to perform in the recovery process?()Aopen the database with the RESTRICTED optionBopen the database with the RESETLOGS optionCrecover to the required SCN only that data file in which the error occurredDrecover all the data files to the same system change number (SCN)
点击查看答案
单选题You created a profile APP_USER and assigned it to the users. After a month, you decide to drop theprofile.Some user sessions are currently connected to the database instance and are using the APP_USERprofile. This command is used to drop the profile: SQL> DROP PROFILE app_user; Which statement describes the result()A The command produces an error.B The profile is dropped and current user sessions use the DEFAULT profile immediately.C The profile is dropped and only the subsequent user sessions use the DEFAULT profile.D The profile is dropped, the sessions are terminated, and the subsequent user sessions use theDEFAULT profile.
单选题The instance abnormally terminates because of a power outage. Which statement is true about redolog files during instance recovery()A Inactive and current redo log files are required to accomplish recovery.B Online and archived redo log files are required to accomplish instance recovery.C All redo log entries after the last checkpoint are applied from redo log files to data files.D All redo log entries recorded in the current redo log file until the checkpoint position are applied to datafiles.
单选题A user states that when the user copies files from ‘My Documents’ to a network share, the files are no longer available locally. Which of the following BEST describes the reason the files are no longer visible?()A The user copied to a read-only folder share.B The user changed the attributes of the files.C The user copied the files from the local My Documents folder.D The user moved instead of copied the files.
单选题You have two computers named Computer1 and Computer2. The computers run Windows XP Professional and are joined to an Active Directory domain. Computer1 contains the recovery agent certificate for the domain. A domain user named User1 encrypts files on Computer2 in a folder named C:/User1. The user leaves the company and the administrator deletes User1’s account. You need to decrypt the files encrypted by User1. What should you do?()A Log on to Computer2 by using the domain administrator account. At the command prompt, run cipher.exe /u c:/user1/*.*. B Create a new domain user account named User1. Log on to Computer2 as User1. Modify the properties of the encrypted files. C Remove Computer2 from the domain. Log on to Computer2 by using the local administrator account. Modify the properties of the encrypted files. D Back up the encrypted files on Computer2. Restore the files on Computer1. Log on to Computer1 by using the recovery agent account and modify the properties of the encrypted files.
单选题Given classes defined in two different files: What is required at line 5 in class SomeApp to use the process method of BitUtils?()Aprocess(bytes);BBitUtils.process(bytes);Capp.BitUtils.process(bytes);Dutil.BitUtils.process(bytes);Eimport util.BitUtils.*; process(bytes);FSomeApp cannot use the process method in BitUtils.
多选题In the parameter file of the production database, the BACKGROUND_DUMP_DEST parameter is set to $ORACLE_HOME/users. Which two types of files would you find in this location?()Athe alert log fileBthe core dump filesCthe change tracking fileDthe user session trace filesEthe database audit trail filesFthe background process trace files