出自:Oracle认证

在Insert触发器中可使用的引用有()。
A::new
B::Old
C::Update
D::New和:Old
You are connected to Recovery Manager (RMAN) without a recovery catalog. There is no copy of the control file available. You want to restore the control file from an autobackup. To retrieve the autobackup,you need the database ID (DBID).  In which two sources would you find the DBID? ()
A:the trace file
B:the alert log file
C:an RMAN session log file
D:the server parameter file
E:the formatted name of a control file autobackup
You executed the following commands in a database session: What could have caused the recycle bin to clean up?()
A:There is demand for space from the new table
B:The undo tablespace does not have sufficient free space
C:The new table name is the same as the table name in the recycle bin
D:The temporary tablespace that is assigned to you does not have sufficient free space
下列哪一个操作可以用来为一个备份操作手动分配通道?()
A:ALLOCATE CHANNEL
B:CREATE CHANNEL
C:CHANNEL ALLOCATE
D:CREATE LINK
Identify three reasons that explain why assigning more than one managed serve achieve better  performance than running one managed server with more resources?()
A:Thread management inside the JVM process might be less effective than context switching between processes on the OS level. It is better to combine both these technologies to achieve full saturation of resources.
B:Current CPUs are multicore units. So starting managed servers in the amount of physical cores and pinning them 1:1 to cores will always get the best performance.
C:By a combination of prioritization of processes on the OS level and Work Manager in WLS, one  could tune the whole environment more precisely.
D:Assigning more than one managed server to hardware will never bring better performance. 
E:More instances means more connections to databases, so one could serve more concurrent  calls on the database level. This is primarily why this approach will give better performance numbers.  
F:Depending on the profile of the application, having more JVMs with smaller heaps will lead to more predictable response times than fewer JVMs with a large heap.
You execute the following commands to audit database activities: SQL > ALTER SYSTEM SET AUDIT_TRIAL=DB, EXTENDED SCOPE=SPFILE; SQL > AUDIT SELECT TABLE, INSERT TABLE, DELETE TABLE BY JOHN By SESSION WHENEVER SUCCESSFUL; Which statement is true about the audit record that generated when auditing after instance restarts?()
A:One audit record is created for every successful execution of a SELECT, INSERT OR DELETE command on a table, and contains the SQL text for the SQL Statements.
B:One audit record is created for every successful execution of a SELECT, INSERT OR DELETE command, and contains the execution plan for the SQL statements.
C:One audit record is created for the whole session if john successfully executes a SELECT, INSERT, or DELETE command, and contains the execution plan for the SQL statements.
D:One audit record is created for the whole session if JOHN successfully executes a select command, and contains the SQL text and bind variables used.
E:One audit record is created for the whole session if john successfully executes a SELECT, INSERT,or DELETE command on a table, and contains the execution plan, SQL text, and bind variables used.
What are three methods to reduce Mysql server exposure to remote connections?()
A:Setting — skip-networking when remote connections are not required
B:Using the sql_mode=STRICT_SECURE after connections are established for encrypted communications
C:Setting specific GRANT privilege to limit remote authentication
D:Setting – mysql_secure_configuration to enable paranoid mode
E:Using SSL when transporting data over remote networks
Exhibit: View the Exhibit.  Your Oracle 10g database has 6 tablespaces in which:  -TEMP is the default temporary tablespace  -UNDOTBS1 is the default undo tablespace  -USERS is the default permanent tablespace  In this database, which two tablespaces can be made read only?()
A:TEMP
B:PROD
C:USERS
D:SYSAUX
E:SYSTEM
F:UNDOTBS1
You notice a high number of waits for the db file scattered read and db file sequential read events in the recent Automatic Database Diagnostic Monitor (ADDM) report. After further investigation, you find that queries are performing too many full table scans and indexes are not being used even though the filter columns are indexed. Identify three possible reasons for this.()
A:Missing or stale histogram statistics
B:Undersized shared pool
C:High clustering factor for the indexes
D:High value for the DB_FILE_MULTIBLOCK_READ_COUNT parameter
E:Oversized buffer cache
You executed the following command in Recovery Manager (RMAN) to perform a backup of the DETTBS tablespace: RMAN> BACKUP TABLESPACE DETTBS;  Under which conditions would this command execute successfully? ()
A: The database is in NOMOUNT state.
B: The database is in NOARCHIVELOG mode and the tablespace is online.
C: The database is in NOARCHIVELOG mode and the tablespace is offline.
D: The database is in ARCHIVELOG mode and the tablespace is offline.
E: The database is in ARCHIVELOG mode and the tablespace is online.
View the Exhibit.  You executed the following command to perform a backup of the USERS tablespace:  RMAN> BACKUP  TABLESPACE USERS;  Which three types of files are backed up? ()
A:password file
B:online redo log files
C:the current control file
D:archived redo log files
E:the current server parameter file
F:all the data files belonging to the USERS tablespace
G:data files belonging to the USERS tablespace and all the default tablespaces
Which background process of a database instance,using Automatic Storage Management (ASM), connects as a foreground process into the ASM instance?()
A: ASMB
B: PMON
C: RBAL
D: SMON
Click the Exhibit button. What is the result?()
A:Value is: 8
B:Compilation fails.
C:Value is: 12
D:Value is: -12
在Oracle中,事务中使用下列SQL语句不会引起锁定()。
A:SELECT
B:INSERT
C:UPDATE
D:DELETE
Given: Which two are true?()
A:The output is mm.
B:The output is mc.
C:Component is-a Meter.
D:Component has-a Meter.
E:DeluxeThingy is-a Component.
F:DeluxeThingy has-a Component.
Which of the following would be affected by setting NLS_LENGTH_SEMANTICS=CHAR?()
A: All objects in the database
B: Tables owned by SYS and SYSTEM
C: Data dictionary tables
D: NCHAR columns
E: CHAR columns
Examine the parameter for your database instance: You generated the execution plan for the following query in the plan table and noticed that the nested loop join was done. After actual execution of the query, you notice that the hash join was done in the execution plan: Identify the reason why the optimizer chose different execution plans.()
A:The optimizer used a dynamic plan for the query.
B:The optimizer chose different plans because automatic dynamic sampling was enabled.
C:The optimizer used re-optimization cardinality feedback for the query.
D:The optimizer chose different plan because extended statistics were created for the columns used.
Which SQL statement displays the date March 19, 2001 in a format that appears as "Nineteenth of March 2001 12:00:00 AM"? ()
A:SELECT TO_CHAR(TO_DATE('19-Mar-2001', 'DD-Mon-YYYY'), 'fmDdspth "of" Month YYYY fmHH:MI:SS AM') NEW_DATE FROM dual;
B:SELECT TO_CHAR(TO_DATE('19-Mar-2001', 'DD-Mon-YYYY'), 'Ddspth "of" Month YYYY fmHH:MI:SS AM') NEW_DATE HH:MI:SS AM') NEW _ DATE FROM dual;
C:SELECT TO_CHAR(TO_DATE('19-Mar-2001', 'DD-Mon-YYYY'), 'fmDdspth "of" Month YYYY NEW _ DATE FROM dual;
D:SELECT TO_CHAR(TO_DATE('19-Mar-2001', 'DD-Mon-YYYY), 'fmDdspth "of" Month YYYYfmtHH:HI:SS AM')NEW_DATE FROM dual;
You want to create the Recovery Manager (RMAN) Virtual Private Catalog (VPC) to maintain a separation of responsibilities along with a consolidation of RMAN repository.  Which condition must be met before you create the VPC?()  
A: A base catalog exists
B: The recovery catalog is empty
C: The base recovery catalog must be dropped
D: A target database is registered in the recovery catalog
Given: What is the result?()
A:Compilation succeeds.
B:Compilation fails due to multiple errors.
C:Compilation fails due to an error only on line 20.
D:Compilation fails due to an error only on line 21.
E:Compilation fails due to an error only on line 22.
The NLS_SORT parameter sets the default sort method for which of the following operations?()
A: WHERE clause
B: ORDER BY clause
C: BETWEEN clause
D: NLSSORT function
E: NLS_SORT function
You need to perform certain data manipulation operations through a view called EMP_DEPT_VU, which you previously created. You want to look at the definition of the view (the SELECT statement on which the view was create.) How do you obtain the definition of the view?()
A:Use the DESCRIBE command in the EMP_DEPT VU view.
B:Use the DEFINE VIEW command on the EMP_DEPT VU view.
C:Use the DESCRIBE VIEW command on the EMP_DEPT VU view.
D:Query the USER_VIEWS data dictionary view to search for the EMP_DEPT_VU view.
E:Query the USER_SOURCE data dictionary view to search for the EMP_DEPT_VU view.
F:Query the USER_OBJECTS data dictionary view to search for the EMP_DEPT_VU view.
When executing a SQL workload, you choose to generate execution plans only, without collecting execution statistics. Which two statements describe the implications of this? ()(Choose two.)
A:It produces less accurate results of the comparison analysis.
B:It automatically calls the SQL Tuning Advisor for recommendations.
C:It shortens the time of execution and reduces the impact on system resources.
D:Only the changes in the execution plan, and not performance regression, are detected.
The warning and critical threshold values have been set to 85% and 97%, respectively, for one of the tablespaces. The current tablespace space usage is 54%. You modify the warning threshold to be 50% and critical threshold to be 53% in Database Control. Which statement is true?() 
A:The new setting would be applied but no alerts would be raised immediately.
B:The new setting would be applied and an alert would be raised immediately.
C:The new setting would be ignored because the tablespace space usage is more than the specified threshold value.
D:The new setting would cause an error because the tablespace space usage is more than the specified threshold value.
You want to create a role to meet these requirements: 1. The role is to be protected from unauthorized usage. 2. The password of the role is not to be embedded in the application source code or stored in a table. method would you use to restrict enabling of such roles()
A:Create the role with external authentication.
B:Create the role as a secure application role.
C:Create the role as a password-protected role.
D:Create a role and use Fine-Grained Access Control (FGAC) to secure the role
从硬件角度指出提高ORACLE运行速度的方法?
Which High Availability solution can provide a consistent, time-delayed (for example, one hour) snapshot of the live production database?()
A:MySQL Replication
B:Distributed Replication Block Device
C:Windows Server Failover Clustering
D:MySQL Cluster
Which DBMS_SCHEDULER procedure(s) can be used to alter an existing job? ()
A:SET_ATTRIBUTE_NULL
B:ALTER_JOB
C:ALTER_JOB_PARAMETERS
D:ALTER
E:SET_ATTRIBUTE
在Oracle中,下述()命令会使挂起的事务完成。
A:COMMIT
B:DELETE
C:UPDATE
D:SELECT
E:INSERT
Which statements about the MEMORY_TARGET initialization parameter are true?() 
A: MEMORY_TARGET can be increased up to the value of MEMORY_MAX_TARGET, if  MEMORY_MAX_TARGET is set to a value greater than zero
B: MEMORY_MAX_TARGET defaults to a value of zero if MEMORY_TARGET is not set
C: MEMORY_TARGET represents the total amount of memory that can be allocated to SGA and PGA memory structures.
D: MEMORY_TARGET is static and cannot be modified without shutting down the instance