Users in your 

题目

Users in your PROD database complain about the slow response of the transactions. While investigating the reason, you find that the transactions are waiting for the undo segments to be available, and undo retention has been set to zero. What would you do to overcome this problem?()

  • A、increase the undo retention
  • B、create more undo segments
  • C、create another undo tablespace
  • D、increase the size of the undo tablespace
参考答案和解析
正确答案:D
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Twenty database users are connected to your database. Five of the users are running long queries involving sort operations. The TEMP tablespace is the default temporary tablespace for your database. You are performing offline tablespace backups of individual tablespaces and erroneously execute the following statement:   SQL>ALTER TABLSPACE temp OFFLINE NORMAL;   What is the result of this statement?()

  • A、 The TEMP tablespace is taken offline. The users using the TEMP tablespace for sorting are disconnected after their queries complete.
  • B、 The TEMP tablespace is taken offline. The users using the TEMP tablespace for sorting are disconnected and must re-execute their queries.
  • C、 The TEMP tablespace is taken offline. The users using the TEMP tablespace for sorting are not disconnected, but these users must re-execute their queries.
  • D、 The TEMP tablespace is not taken offline. The users using the TEMP tablespace for sorting are not disconnected, and their queries execute successfully.

正确答案:D

第2题:

Unfortunately,quite a number of the users a redissatisfied()your Straw Baskets supplied to Order No.T90.

  • A、to
  • B、with
  • C、on
  • D、above

正确答案:B

第3题:

You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()

A.A

B.B

C.C

D.D


参考答案:C

第4题:

You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker.  You need to prevent your co-worker from modifying your wireless network profile.  What should you do?()

  • A、Disable the Connect even if the network is not broadcasting option.
  • B、In the Network and Sharing Center window, click the Diagnose and repair option.
  • C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.
  • D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.

正确答案:D

第5题:

There is a problem with one of the disks used for your database and your system administrator informs you that the disk needs to be replaced. The replacement disk will not be available until tomorrow.  There was only one data file on this disk; it belongs to the USERS tablespace in your PROD database. Your PROD database runs in ARCHIVELOG mode and nightly online backups are taken. The users need to be able to access the data in the USERS tablespace before the replacement disk arrives. You have already taken the USERS tablespace offline and have restored the data file from last night’s backup to a new disk. Which additional steps are required in order to make the USERS tablespace available?()

  • A、Only bring the tablespace back online.
  • B、Only recover the tablespace and then bring the tablespace back online.
  • C、Shut down the database, recover the data file and then start up the database.
  • D、Issue the ALTER DATABASE RENAME FILE command, recover the tablespace, and then bring the tablespace online.
  • E、Recover the tablespace, issue the ALTER DATABASE RENAME FILE command, and then bring the tablespace online.

正确答案:D

第6题:

Your company has a single active directory domain. The company network is protected by a firewall. Remote users connect to your network through a VPN server by using PPTP. When the users try to connect to the VPN server, they receive the following error message: Error 721: The remote computer is not responding. You need to ensure that users can establish a VPN connection. What should you do? ()

  • A、Open port 1423 on the firewall
  • B、Open port 1723 on the firewall
  • C、Open port 3389 on the firewall
  • D、Open port 6000 on the firewall

正确答案:B

第7题:

Your end users will need to change values in a REF lookup field in the form application you create. To facilitate choosing a new appropriate value, your provide them with? ()

  • A、An LOV for REFS. 
  • B、A list item for REFs. 
  • C、A radio group for REFs. 
  • D、A hierarchical tree for REFS

正确答案:A

第8题:

You are the administrator of a database that contains 64 lookup tables. These tables store static data that should not change. However, users report that some of this data is being changed. You need to prevent users from modifying the data.

You want to minimize changes to your security model and to your database applications. How should you modify the database?

A.Create a filegroup named LOOKUP. Move the lookup tables to this filegroup. Select the read only check box for the filegroup.

B.Create a database role named datamodifier. Grant SELECT permissions to the datamodifier role. Add all users to the role.

C.Deny INSERT, UPDATE, and DELETE permissions for all users. Create stored procedures that modify data in all tables except lookup tables. Require users to modify data through these stored procedures.

D.Create a view of the lookup tables. Use the view to allow users access to the lookup tables.


正确答案:A
解析:Explanation:SQLServer2000allowsfilegroupsotherthantheprimaryfilegrouptobemarkedasreadonly.Afilegroupthatismarkedread-onlycannotbemodified.Tablesthatmustnotbemodifiedcanbeplacedonafilegroupthatcanthenbemarkasread-only.Thiswillpreventsaccidentalupdates.IncorrectAnswers:B:Thissolutioneffectivelypermitsalluserstomodifyanytableinthedatabase,astheywouldallhaveSELECTpermissionstothedatabase.C:ThissolutionwilleffectivelypreventallusersfrombeingabletoperformingthesetasksonalltablesinthedatabaseastheyaredeniedpermissionstorunINSERT,UPDATE,orDELETEstatementsagainstthedatabase.Abettersolutionwouldbetoapplythedenypermissionsatthetablelevelofthelookuptables.Thiswould,however,requireunnecessaryadministrativetime.D:Viewsarevirtualtablesthatareusedtofiltertablesorrowsthattheusersshouldnothaveaccessto,however,iftheusershaveaccesstothebasetables,theycanstillrunINSERT,UPDATE,andDELETEstatementsagainstthebasetable.

第9题:

You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you are located.  A new TestKing.com compliance policy requires that e-mail messages sent to the marketing users olderthan 150 days be deleted and e-mail messages sent to users in other departments are deleted after 90days. You receive an intruction from the CIO to recommend a solution to management that will complywith the eompliance policy. What should you do?()

  • A、Your best option would be to create two Managed Folder mailbox policies.You should then use one for users in the marketing department and the other for users in the other departmens.
  • B、Your best option would be configure deleted item retention for all testking.com users.
  • C、Your best option would be to create two new message classifications.You should then use one for e-mails sent to users in the marketing department and the other for e-mails sent to users in the other departments.
  • D、Your best option would be to configure Personal Archives for users in the marketing department.

正确答案:A

第10题:

Your computer is part of a workgroup. You share files with other users on the network. You configure exceptions in Microsoft Windows Firewall to allow file sharing. Users report that they are unable to connect to your computer.  You need to ensure that other users are able to access only the shared files.  What should you do? ()

  • A、Restart the Workstation service on your computer.
  • B、Change all of your TCP port exceptions to UDP port exceptions.
  • C、Ensure parental controls are not configured to block file sharing.
  • D、Clear the Block all incoming connections check box in Windows Firewall.

正确答案:D

更多相关问题