Which of the following methods can be used to detect block corruption?()
第1题:
A. It checks the database for intrablock corruptions.
B. It can detect corrupt pfiles.
C. It can detect corrupt spfiles.
D. It checks the database for interblock corruptions.
E. It can detect corrupt block change tracking files.
第2题:
You have a very large table that your users access frequently. Which of the following advisors will recommend any indexes to improve the performance of queries against this table?()
第3题:
Which of the following tools and techniques can be used to collect information for the project closure reports?
A Customer Surveys
B Brainstorming
C Document and Performance Analysis
D Lessons Learned
E All of the above
第4题:
You execute the following Recovery Manager (RMAN) commands in he following order: BACKUP VALIDATE DATABAE RECOVER CORRUPTION LIST; Which two tasks are performed by these commands?()
第5题:
which one of the following best where layer can be used?()
第6题:
Which wire rope purchases may be used with a 30-ton pedestal crane ________.
A.Hoist
B.Luff
C.Rider block
D.All of the above
第7题:
Which of the following IOS commands can detect whether the SQL slammer virus propagates in yournetworks?()
第8题:
98 Which of the following tools and techniques can be used to collect information for the project closure reports?
A. Customer Surveys
B. Brainstorming
C. Document and Performance Analysis
D. Lessons Learned
E. All of the above
第9题:
Which two statements are true about the RMAN validate database command?()
第10题:
Which of the following advisors within the Oracle advisory framework will analyze a single SQL statement and make recommendations for performance improvement?()