You are using the Database Configuration Assistant to configure your Oracle database. Which of the following terms pertains to the creation of an object from which creation of the other database can be based? ()A、Clone B、Copy C、Template D、Terminal 

题目

You are using the Database Configuration Assistant to configure your Oracle database. Which of the following terms pertains to the creation of an object from which creation of the other database can be based? ()

  • A、Clone 
  • B、Copy 
  • C、Template 
  • D、Terminal 

相似考题
更多“You are using ”相关问题
  • 第1题:

    You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()

    • A、by using triggers
    • B、by using external tables
    • C、by using anonymous PL/SQL blocks
    • D、by auditing all DML operations on the table

    正确答案:A

  • 第2题:

    You are maintaining your database in Oracle10g. You find that the INDEXES index tablespace should be recovered. How will you recover the index tablespace?()

    • A、 by using the Flashback Database feature
    • B、 by using RMAN incomplete recovery
    • C、 by performing a user-managed incomplete recovery
    • D、 by dropping and re-creating the index tablespace

    正确答案:D

  • 第3题:

    You need to recommend a solution for managing administrative rights for the branch office client computers. The solution must meet the companys technical requirements.What should you recommend configuring?()

    • A、Account Policies by using GPOs
    • B、Local Users and Groups by using Group Policy preferences
    • C、Restricted Groups by using GPOs
    • D、Security Options by using Group Policy preferences

    正确答案:B

  • 第4题:

    You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1 is configured as an enterprise root certification authority (CA). You need to back up the CA's database and log files. You must achieve this goal by using the minimum amount of disk space. What should you run? ()

    • A、Certreq.exe by using the –new parameter
    • B、Certutil.exe by using the -backup parameter
    • C、Cipher.exe by using the /k parameter
    • D、Ntbackup.exe by using the systemstate parameter

    正确答案:B

  • 第5题:

    You are creating a Windows Forms application by using the .NET Framework 3.5 The application is used by a financial service provider.You discover that the service provider transfers large amounts of data by using XML.You need to read and validate the XMLdocuments in the most time efficient manner.Which technology should you use?()

    • A、The XmlReader class
    • B、The XmlDocument class
    • C、The XmlResolver class
    • D、The LINQ to XML method

    正确答案:A

  • 第6题:

    You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.the Company.com contains an exchange server 2010 server named -sr14.-sr14 is configured to with outlook anywhere.you have received instructions from the cio to make sure that the users can connect to -sr14, using outlook anywhere. What should you do?()

    • A、You should consider using the Exchange Remote Connectivity Analyzer.
    • B、You should consider checking the properties of the WEB Outlook Provider.
    • C、You should consider using the Mail Flow Troubleshooter.
    • D、You should consider using the Test-OwaConnectivity cmdlet.

    正确答案:A

  • 第7题:

    单选题
    You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()
    A

    by using triggers

    B

    by using Data Pump

    C

    by using external tables

    D

    by using anonymous PL/SQL blocks


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    You disabled the Flashback Database feature by using the following command:  SQL> ALTER DATABASE FLASHBACK OFF;  What would be the effect of this command on the existing flashback logs?()
    A

     Flashback logs are not deleted.

    B

     Flashback logs are deleted automatically.

    C

     Flashback logs are deleted only if you are using Recovery Manager (RMAN)

    D

     Flashback logs are deleted only if you are using Oracle Manager Files (OFM)

    E

     Flashback logs are deleted only if you are using Automatic Storage Management (ASM)


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()
    A

    by using triggers

    B

    by using external tables

    C

    by using anonymous PL/SQL blocks

    D

    by auditing all DML operations on the table


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    You have a public computer that runs Windows XP Professional. All users log on to the computer by using the same user account. You log on to the computer by using the local administrator account and attempt to access a secure Web site. You discover that you have automatically logged on to the secure Web site by using the credential of another user. You need to connect to the secure Web site by using your own credentials. What should you do?()
    A

    Run ipconfig /flushdns at the command prompt. 

    B

    Reset the password for the local administrator user account. 

    C

    From the Internet Options in Internet Explorer, clear the AutoComplete history.

    D

    From the Internet Options in Internet Explorer, delete the Temporary Internet Files. 


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    You want a record of all queries that are not using indexes. How would you achieve this?()
    A

    By enabling the Slow Query Log because all queries that are not using indexes will be logged automatically

    B

    By enabling the Error Log because not using indexes is an error

    C

    By enabling the Slow Query Log and using the – log-queries-not-using-indexes option

    D

    By enabling the Error Log and using the – log-queries-not-using-indexes option


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    You disabled the Flashback Database feature by using the following command:  SQL> ALTER DATABASE FLASHBACK OFF;  What would be the effect of this command on the existing flashback logs?()
    A

    Flashback logs are not deleted.

    B

    Flashback logs are deleted automatically.

    C

    Flashback logs are deleted only if you are using Recovery Manager (RMAN).

    D

    Flashback logs are deleted only if you are using Oracle Managed Files (OMF).

    E

    Flashback logs are deleted only if you are using Automatic Storage Management (ASM).


    正确答案: D
    解析: 暂无解析

  • 第13题:

    You issued the following command to analyze the SCOTT.EMP table for block corruption:   ANALYZE TABLE SCOTT.EMP VALIDATE STRUCTURE;  You received the following error:   ORA-01578: ORACLE data block corrupted  (file # %s, block # %s)   How will you resolve the block corruption problem?()

    • A、 by using the DBMS_REPAIR package
    • B、 by using the DB_BLOCK_CHECKING parameter
    • C、 by using the DBVERIFY utility
    • D、 will not be completely resolved until the hardware fault is corrected

    正确答案:D

  • 第14题:

    You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  An exception management framework is not used in the Web application. You need to ensure thatthe application log the unhandled exceptions automatically to the event log. You need to configurethe Web.config file to accomplish this. Identify the configuration that will assist you in thisscenario?()

    • A、You should consider using the <healthMonitoring enabled="true"/> configuration.
    • B、You should consider using the <deployment retail="true"/> configuration.
    • C、You should consider using the <customErrors mode="On"/> configuration.
    • D、You should consider using the <trace enabled="true"/> configuration.

    正确答案:A

  • 第15题:

    You have a server that runs Windows Server 2003 Service Pack 2 (SP2). You create an Automated System Recovery (ASR) backup of the server. You restart the server and receive a critical error. You need to restore the server by using ASR. What should you do first? ()

    • A、Start the computer by using Safe mode.
    • B、Start the server by using the ASR floppy disk.
    • C、Start the computer by using the Last Known Good Configuration option.
    • D、Start the server by using the Windows Server 2003 SP2 installation media.

    正确答案:D

  • 第16题:

    You develop a Web application. Your application contains two settings in the Web.config file. You deploy your application to production. You need to modify the application settings in the production environment without manually editing the XML markup in the Web.config file. What should you do? ()

    • A、Modify the application settings by using the Web Site Administration Tool.
    • B、Modify the application settings by using the Visual Studio property page editor for the project.
    • C、Modify the application settings by using the resource editor.
    • D、Modify the application settings by using the Visual Studio start options editor.

    正确答案:A

  • 第17题:

    You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to have the permission of a public folder named KingPublic modified.What should you do?()

    • A、You should consider using the Microsoft Office Outlook tool.
    • B、You should consider using the Public Folder Management Console tool.
    • C、You should consider using the Exchange Control Panel (ECP) tool.
    • D、You should consider using the Exchange Management Console (EMC) tool.

    正确答案:A

  • 第18题:

    You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. The ABC.com network has a domain controller named ABC_DC01.Which of the following tools would you use to manually remove Active Director from ABC_DC01?()

    • A、You should consider using the dism.exe command-line tool.
    • B、You should consider using the dsadd.exe command-line tool.
    • C、You should consider using the pcpromo.exe command-line tool.
    • D、You should consider using the ntdsutil.exe command-line tool.
    • E、You should consider using the netsh.exe command-line tool.
    • F、You should consider using the rexec.exe command-line tool.

    正确答案:D

  • 第19题:

    单选题
    You need to recommend a deployment strategy for App1. What should you recommend?()
    A

    Assign App1 to users by using a Group Policy.

    B

    Publish App1 to users by using a Group Policy.

    C

    Deploy App1 as a RemoteApp program by using an MSI file.

    D

    Deploy App1 as a RemoteApp program by using an RDP file.


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    On Monday, you dropped the DEPT table from your schema and then you re-created the DEPT table in your schema. On Wednesday, you have a requirement to restore the DEPT table from the recycle bin. Which statement is correct?()
    A

     You cannot restore the DEPT table by using the Oracle Flashback Drop feature because a table with the name DEPT already exists in your schema.

    B

     You can restore the DEPT table by using the Oracle Flashback Drop feature, provided you use the RENAME TO clause.

    C

     You cannot restore the DEPT table by using the Oracle Flashback Drop feature because the contents of the recycle bin are purged every 12 hours by default.

    D

     You can restore the DEPT table by using the Oracle Flashback Drop feature and a system-generated name will be assigned to the restored table.


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    You are maintaining your database in ARCHIVELOG mode. An important table, SCOTT.EMPLOYEE, is dropped and purged from the Recycle Bin on Monday at 2:00 P.M. You do not use RMAN to perform backups. You performed the last full user-managed backup at 9:00 P.M. on Sunday.  How will you recover the dropped table, SCOTT.EMPLOYEE?()
    A

     by using the Flashback Table feature

    B

     by using the Flashback Database feature

    C

     by performing incomplete recovery using RMAN utility

    D

     by performing incomplete recovery using user-managed recovery


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  An exception management framework is not used in the Web application. You need to ensure thatthe application log the unhandled exceptions automatically to the event log. You need to configurethe Web.config file to accomplish this. Identify the configuration that will assist you in thisscenario?()
    A

    You should consider using the <healthMonitoring enabled=true/> configuration.

    B

    You should consider using the <deployment retail=true/> configuration.

    C

    You should consider using the <customErrors mode=On/> configuration.

    D

    You should consider using the <trace enabled=true/> configuration.


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    You want to check the EMP table in the user, Scott’s schema for block corruption. You also want to fix the corrupted blocks, if any. How will you accomplish the required task?()
    A

    by using the ANALYZE utility

    B

    by using the DBVERIFY utility

    C

    by using the DB_BLOCK_CHECKING parameter

    D

    by using the DBMS_REPAIR package


    正确答案: B
    解析: 暂无解析