ANALYZE operations
dbv
SQL queries that access the potentially corrupt block
RMAN
All of the above
第1题:
A. RAID
B. Registered memory
C. SDRAM
D. ECC
第2题:
Which of the following best describes a hash function?()
第3题:
Which of the following methods is used to increase the number of processes sharing the CPU?
A.Interrupt
B.Scheduler
C.Swapping
D.Working Set
第4题:
Which of the following encryption methods is often used along with L2TP?()
第5题:
Which of the following statements are true? ()
第6题:
A.RSH
B.SNMP
C.FTP
D.TELNET
第7题:
Which two statements are true about the RMAN validate database command?()
第8题:
A. It checks the database for intrablock corruptions.
B. It can detect corrupt pfiles.
C. It can detect corrupt spfiles.
D. It checks the database for interblock corruptions.
E. It can detect corrupt block change tracking files.
第9题:
Which of the following methods can move files in clear text and can be easily intercepted?()
第10题:
Which of the following methods can be used to apply a file system to a hard drive partition?()