Ctrl + F is the shortcut in your browser or operating system that allows you to find words or questions quickly.
Ctrl + Tab to move to the next tab to the right and Ctrl + Shift + Tab to move to the next tab to the left.
On a phone or tablet, tap the menu icon in the upper-right corner of the window; Select "Find in Page" to search a question.
Share UsSharing is Caring
It's the biggest motivation to help us to make the site better by sharing this to your friends or classmates.
Explores advanced concepts and techniques in managing large-scale databases, including data modeling, security, and emerging trends in database technology.
To use guaranteed restore points, you must also enable these prerequisites:The database must be running in ARCHIVELOG mode.
Other datafiles required to recover the tablespace(s), such as the datafiles for the SYSTEM, UNDO, and TEMP tablespaces
Is in charge of redo log buffer management. It is one of the most active processes in an instance with heavy DML activity.
The four steps to create a set of recommendations are as follows: 1. Create a task 2. Define the workload 3. Generate the recommendations 4. Review and implement the recommendations
Identify the true statement about Automatic Memory Management (AMM).
Statistics Analysis Check for stale or missing statistics, and recommend refreshing or creating them
Structure Analysis Restructure the SQL statements to see if better execution plans are generated
A distinct advantage to using ARCHIVELOG mode is that you can perform online backups (also known as hot backups), while the database is available to users.
To use guaranteed restore points, you must also enable these prerequisites: The COMPATIBLE initialization parameter must be 10.2 or higher.
Which of the following commands does not back up the current control file?
The _____ is an area of memory allocating dynamic sections of itself, privately for one set of connection processes.
holds the most recent changes to the data blocks in the datafiles.
When restoring a database to a new host, what is the first command you should run as part of the restoration process?
You can use two different methods to authenticate a database administrator: operating system (OS) authentication or password file authentication.
Using Database Replay consists of four main steps: 1. Workload capture 2. Workload preprocessing 3. Workload replay 4. Analysis and reporting
You will perform complete closed database recovery. Put the following steps in the correct order. 1. Open the database to users. 2. Identify files needed for recovery. 3. Start up the database in MOUNT mode. 4. Bring the datafiles online. 5. Apply archived and online redo log files to roll forward. 6. Oracle applies undo to roll back uncommitted changes. 7. Restore recovery-related files containing committed and uncommitted transactions
Recorded client request contains the information: SQL text
key tuning parameters for the BACKUP command: _________ The maximum number of input files that a channel can have open at a given time.
Which of the following does not occur when you register a target database with the recovery catalog database using the REGISTER DATABASE command?
Recorded client request contains the information: Bind values
You have just received a pager alert indicating that the flash recovery area is below 3 percent free space. Which view and column can you query for a possible corrective action for this space condition?
At which level does ASM perform mirroring?
DUPLICATE command: OPEN RESTRICTED When the destination database is ready, open it immediately with the RESTRICTED SESSION option.
Which of the following columns is not in the data dictionary view FLASHBACK_TRANSACTION_QUERY?
The _______is the next level of logical grouping in the database
The SQL Tuning Advisor performs all but which of the following analyses?
Recorded client request contains the information: Transaction information
Your server’s physical memory is 8GB and no other applications or Oracle instances are running on the server. For a new Oracle instance running a decision support system, what is a good starting point for setting PGA_AGGREGATE_TARGET?
Identify the true statement regarding incremental and differential backups.
What is the value for INSTANCE_TYPE in the init.ora file or SPFILE for an ASM instance?
Which of the following methods can you use to retrieve the current System Change Number (SCN)?
Backing up the control file for a database running in ARCHIVELOG mode produces the same end result as the method you use in NOARCHIVELOG mode.
contains two major subcaches: the library cache and the data dictionary cache.
If you are interested in recovering only a small set of logically isolated tables to a previous point in time, you may be able to perform recovery using Oracle’s Flashback Table features.
Which of the following initialization parameters control Automatic Shared Memory Management (ASSM)?
Choose the four best commands from the following list that you would use to enable ARCHIVELOG mode, and put them in the correct order: 1. STARUP MOUNT 2. SHUTDOWN ABORT 3. ALTER DATABASE ARCHIVELOG; 4. STARTUP FORCE 5. ALTER DATABASE ENABLE ARCHIVELOG; 6. ALTER SYSTEM SWITCH LOGFILE; 7. SHUTDOWN NORMAL 8. ALTER DATABASE OPEN; 9. SHUTDOWN IMMEDIATE
Identify the data dictionary view you can use to check for object dependencies between tablespaces.
If you do not use a recovery catalog, what data dictionary or dynamic performance views must you query to retrieve RMAN backup information?
Which of the following roles should you grant to the recovery catalog owner?
writes new or changed data blocks (known as dirty blocks) in the buffer cache to the datafiles.
RMAN makes it easy to make a full copy or a subset of a target database.
Which of the following procedures will run a SQL Tuning Advisor job against a SQL Tuning Set?
Which two dynamic performance views can you use to identify files that need to be backed up, regardless of whether you are in ARCHIVELOG mode or NOARCHIVELOG mode?
DUPLICATE command: SKIP TABLESPACE Exclude specific tablespaces, except for SYSTEM and UNDO.
Performance tuning is the final step in a four-step process: planning, implementing, and monitoring must precede it.
The phrase “closed databaserecovery” is somewhat of a misnomer if you consider that the database instance may still be available when one or more datafiles become unavailable.
To use guaranteed restore points, you must also enable these prerequisites: The database must be running in ARCHIVELOG mode
What happens to the state of an ASM instance when a connected RDBMS instance fails?
You have created a virtual private catalog to separate your RMAN administration duties among several DBAs for 20 different databases. Which role must you grant to each virtual catalog owner to allow the person to access existing registered databases?
If you specify the initialization parameter DB_RECOVERY_FILE_DEST, what other initialization parameter must be set?
Which of the following procedures will run a SQL Access Advisor job against a single SQL statement?
Place the following commands in the correct order for restoring a control file from an RMAN autobackup: 1. RECOVER DATABASE 2. ALTER DATABASE OPEN RESETLOGS 3. STARTUP NOMOUNT 4. ALTER DATABASE MOUNT 5. RESTORE CONTROLFILE FROM AUTOBACKUP
backup is the default type of incremental backup that backs up all changed blocks since the last level 0 or level 1 incremental backup
To use guaranteed restore points, you must also enable these prerequisites: You must have a flash recovery area configured.
You can use V$BACKUP_ASYNC_IO to monitor asynchronous RMAN I/O. What column or columns do you use to determine which file is the bottleneck during a backup?
The types of user-managed backup you can perform are dependent on whether your database is running in ARCHIVELOG mode.
Identify the correct statement regarding TSPITR terminology.
You can use DELETE_REPLAY_INFO to delete a report in the replay directory.
DUPLICATE command: NOFILENAMECHECK Don’t check for duplicate filenames between the source and destination databases.
If you are recovering one or more tablespaces or the entire database from backups that have different passwords, you can conveniently specify all the passwords at once with _______
The point in time or SCN to which the tablespace will be recovered.
The three possible states of a log file group are INACTIVE, ACTIVE, and CURRENT.
Which of the following two dynamic performance views can you use to identify the relationship between Oracle server sessions and RMAN channels?
Access Paths Analyze the impact of creating new indexes, materialized views, and partitioning.
Which of the following statement is not true regarding database backups?
Identify the true statement about Flashback Data Archives.
Which of the following data dictionary views contains a list of the tables using a Flashback Data Archive?
Which is the best method for recovering a tempfile?
You have lost the most recent archived redo log files from the recovery catalog database as well as the tablespace containing the RMAN catalog. You can do an incomplete restore of the recovery catalog database to a point in time after the target databases were registered with the recovery catalog. What commands can you use to resynchronize the target database’s metadata and backup information with the recovery catalog database?
You have configured backup optimization for your database using CONFIGURE BACKUP OPTIMIZATION ON. For which of the following commands will RMAN not skip a backup if the files are identical?
SCN-based incomplete recovery works well if your applications save the SCN at critical points in a process flow, or the alert or trace logs indicate a serious error as of a particular SCN.
What is the difference between an RMAN local script and an RMAN global script?
backout options: CASCADE Back out all transactions and their dependent transactions.
Before running the first replay, you must perform some prerequisite checks: Ensure that the target system has access to the replay directory
Identify the correct statement regarding duplicate databases created with RMAN.
What is the difference between a full backup and a whole database backup?
You want to switch from AMM to ASMM. What is the correct statement you need to run?
If a user connection is dropped or a user process otherwise fails, ______ does the cleanup work
Recovery falls into one of two general categories: complete and incomplete.
When you want to create a duplexed backupset, what is the maximum number of copies of each backup piece you can create with one BACKUP command?
backout options: NONCONFLICT_ONLY Back out changes to nonconflicting rows of the specified transaction only
You set the initialization parameter BACKUP_TAPE_IO_SLAVES to TRUE. What effect does this have on the type of I/O that the server processes perform for RMAN if you are using tape?
If you want to use two-way mirroring (normal redundancy) for a new disk group, how many failure groups do you need?
When using the VERSIONS BETWEEN clause for Flashback Version Query, what can’t you use to restrict the number of rows returned by the query?
What are the default characteristics of an ASM file created with no options?
is used by the Oracle JVM (Java Virtual Machine) for all Java code and data within a user session.
Which of the following clauses is not valid for the RMAN DUPLICATE command?
key tuning parameters for the BACKUP command: ______________ The maximum size of a backup piece per channel.
Which of the following background processes exist in both an ASM instance and an RDBMS instance, and also support ASM disk groups?
To create a duplicate database, put the following steps in the correct order: 1. Start the auxiliary instance as NOMOUNT. 2. Allocate auxiliary channels if necessary. 3. Run the RMAN DUPLICATE command. 4. Create a password file for the auxiliary instance. 5. Ensure network connectivity to the auxiliary instance. 6. Open the auxiliary instance. 7. Start the source database in MOUNT or OPEN mode. 8. Create an initialization parameter file for the auxiliary instance. 9. Create backups or copy existing backups and archived log files to a common location accessible by the auxiliary instance.
What happens to the rows in FLASHBACK_TRANSACTION_QUERY when part of the transaction is no longer available in the undo tablespace?
Before running the first replay, you must perform some prerequisite checks:Remap references to other production systems via database links, external .tables, directory objects, URLs, and E-mail notifications.
Under what circumstances would you use the RMAN command UPGRADE CATALOG?
Before running the first replay, you must perform some prerequisite checks:Remap connection strings to the replay system from the production system.
When you run the RMAN RESTORE CONTROLFILE command, where does RMAN put the previous version of the control file?
Which of the following initialization parameters is not required to configure Flashback Database operations?
The net service name of your target database is DW and the net service name of your recovery catalog database is RCAT. The environment variable ORACLE_SID has a value of RCAT. Which of the following sets of commands will successfully create a recovery catalog?
Which tablespaces contain critical datafiles that must be recovered when the database is offline?
What is the difference between a critical and a noncritical datafile in a recovery scenario?
SQL Profiling Collect auxiliary statistics on a SQL statement along with partial execution statistics and store them in a SQL Profile.
is a group of extents that form a database object that Oracle treats as a unit, such as a table or index.
The database buffer cache holds blocks of data from disk that have been recently read to satisfy a SELECT statement or that contain modified blocks that have been changed or added from a Data Manipulation Language (DML) statement.
It refers to one of the log file status in V$LOG described as the log group is not needed for instance recovery, may be in use for media recovery, and may or may not be archived
The group of datafiles containing the tablespace(s) to be recovered.
Which of the following CREATE RESTORE POINT commands will preserve the restore point past the time specified by the initialization parameter CONTROL_FILE_RECORD_KEEP_TIME?
Which of the following is the default substitution variable for the FORMAT clause of the BACKUP command?
DUPLICATE command: SKIP READONLY Exclude read-only tablespaces from the copy operation.
backups back up all changed blocks since the last level 0 incremental backup
Which of the following initialization parameters is not valid?
Which of the following parameters are required for an ASM instance?
You have lost all online control files. Specify the correct order for the following tasks: · Restore the control file from backup or run CREATE CONTROLFILE. · Start database recovery and specify the keywords BACKUP CONTROLFILE. · Start up the database in MOUNT mode. · Open the database with RESETLOGS. · Shut down the database.
Which of the following are not RMAN standalone commands?
To use guaranteed restore points, you must also enable these prerequisites: You must have archived redo log files available starting from the time of the first guaranteed restore point.
Which of the following is not a valid status for an online redo log group?
Question text The SGA is a group of memory structures for an Oracle instance that are shared by the users of the database instance
is an optional area of the SGA. It is used for transactions that interact with more than one database, message buffers for processes performing parallel queries, and RMAN parallel backup and restore operations.
The SQL Tuning Advisor analyzes one or more SQL statements sequentially, examining statistics, and potentially recommends creating a SQL profile, new indexes, materialized views, or a revised SQL statement.
When you want to restore backup, either to the same database or to a different database, you must specify the decryption password with ________
backout options: NOCASCADE_FORCE Back out the specified transactions, ignoring dependent transactions.
a database ______ is the smallest unit of storage in Oracle.
It refers to one of the log file status in V$LOG described as The log is being cleared by ALTER DATABASE CLEAR LOGFILE. After being cleared, the status changes to UNUSED.
You want to remap your database links so that they do not reference production database objects. Within which Database Replay step do you perform the remapping?
backout options: NOCASCADE Back out only the specified transaction, if possible.
After the capture operation is complete, the captured information must be preprocessed by transforming the captured data into replay files that can be easily replayed on the target system
What is the difference between coarse striping and fine striping for files in a disk group?
Your database is running in NOARCHIVELOG mode, and you perform occasional incremental level 1 backups in MOUNT mode. To what point in time can you recover the database if you lose a datafile for the USERS tablespace?
It refers to one of the log file status in V$LOG described as the log group has not been used yet.
is a block of executable code designed to perform a specific task
A default installation of the Oracle database using the Oracle Universal Installer with a seed database, or using the Database Creation Assistant, will automatically create a password file.
What method does RMAN use to enable fast incremental backup?
What is the difference between the V$LOG and V$LOGFILE views?
In the case of a system crash or instance failure, due to a power outage or CPU failure, the ______, performs crash recovery by applying the entries in the online redo log files to the datafiles.
The group of datafiles containing the tablespace(s) to be recovered
backup of a database involves reading a set of database rows and writing them to a file
backups involve copying the files that constitute the database. These backups are also referred to as file system backups because they involve using operating system file backup commands.
To enable password encryption for a specific backup, use the ______ command
key tuning parameters for the BACKUP command: ____________ The maximum number of files per backupset.
The RMAN SWITCH command is equivalent to what SQL command?
What is the maximum number of database writer processes (DBWn) in an Oracle database instance?
You run the following command to create a whole database backup: RMAN< backup as copy database spfile plus archivelog delete input; What does the DELETE INPUT clause do?
If you lose all of the tempfiles from your temporary tablespace, what is the most likely result noticed by your users?
To keep up this site, we need your assistance. A little gift will help us alot.
Donate- The more you give the more you receive.
Related SubjectWeb Application Development
Web Systems Technologies
Web Development
Geographic Information Systems
Computer Information Systems
Relational Database Systems
Introduction to Multimedia
Database Management System
The Supply Chain
Diabetes Education Month
Configuration Management
Medical Office Administration
Hospitality Management
Inventory Production Control
Food Service Management
Emergency and Disaster Management
Business Administration
Strategy Management and Acquisition
Risk Management
Real Estate Appraisal and Property Management
Investment and Portfolio Management
Credit and Collection
Animation Project
Massage Machines
Knowledge Management
Electronics Engineering Technology
Modeling and Simulation
Database Management System 2
Social Media Specialist
Engineering
Quantitative Methods
Numerical Methods
Mobile Application Design and Development 2
Algorithms and Complexity
Calculus
Fundamental Qualitative Characteristics of Accounting Information
Environmental Marketing
Venture Capital
System Analysis Design and Development
Cloud Computing and the Internet of Things
Texas Border Wall
Houthi, Missile, and Israel in Modern Conflicts
TikTok Ban Debate
Huawei Smartphone Innovation
Social Security Fairness Act
Intrusion Detection System
Operating System Functions
Network Administration
Health Information Technology
Computer Support Technician
Risk Management Applied to Safety Security and Sanitation
Property Management System
Information Assurance and Security 2
Information Assurance and Security 3
Information Security and Management
Information Management
Fundamentals of Investigation and Intelligence
Fundamentals of Database System
Cyber Security: Theories and Practice
Shopee Cashback Voucher
Temu $0 Shipping Fee
Amazon 75% Off Discounts