更多"Which three tasks can be performed "的相关试题:
[多项选择]Which three tasks can be performed using a duplicate database?()
A. Testing the backup and recovery procedures
B. Testing the upgrade of an Oracle database to a new release
C. Testing the effect of an application changes on database performance
D. Continuously updating archive log files from the target database to support failover
[多项选择]Which three tasks can be automatically performed by the Automatic Data Optimization feature ofInformation lifecycle Management (ILM)?()
A. Tracking the most recent read time for a table segment in a user tablespace
B. Tracking the most recent write time for a table segment in a user tablespace
C. Tracking insert time by row for table rows
D. Tracking the most recent write time for a table block
E. Tracking the most recent read time for a table segment in the SYSAUX tablespace
F. Tracking the most recent write time for a table segment in the SYSAUX tablespace
[多项选择]Which three operations can be performed as multipartition operations in Oracle?()
A. Merge partitions of a list partitioned table
B. Drop partitions of a list partitioned table
C. Coalesce partitions of a hash-partitioned global index.
D. Move partitions of a range-partitioned table
E. Rename partitions of a range partitioned table
F. Merge partitions of a reference partitioned index
[多项选择]Which three functions are performed by the SQL Tuning Advisor?()
A. Building and implementing SQL profiles
B. Recommending the optimization of materialized views
C. Checking query objects for missing and stale statistics
D. Recommending bitmap, function-based, and B-tree indexes
E. Recommending the restructuring of SQL queries that are using bad plans
[单项选择]Which of the following tasks is not performed by the job coordinator?()
A. Update job log when a job completes
B. Spawn and remove job slaves
C. Write/read job info to/from memory cache
D. Query job table
E. Pass job information to job slaves
[单项选择]Which tasks can be accomplished using the DBMS_LOB. SETOPTIONS procedure?()
A. only encryption and compression settings for all SecureFile LOBs
B. only encryption and deduplication settings for only SecureFile CLOBs
C. deduplication, encryption, and compression settings for all SecureFile LOBs
D. deduplication, encryption, and compression settings only for SecureFile CLOBs
[多项选择]Which two tasks can you perform using only the TO_CHAR function? ()
A. convert 10 to 'TEN'
B. convert '10' to 10
C. convert 10 to '10'
D. convert 'TEN' to 10
E. convert a date to a character expression
F. convert a character expression to a date
[多项选择]Which two tasks can your perform by using the TO_CHAR function?()
A. Convert 10 to ‘TEN’
B. Convert ‘10’ to 10
C. Convert ‘10’ to ‘10’
D. Convert ‘TEN’ to 10
E. Convert a date to a character expression
F. Convert a character expression to a date
[多项选择]Which three security concerns can be addressed by a tunnel mode IPSec VPN secured by AH?()(Choose three.)
A. data integrity
B. data confidentiality
C. data authentication
D. outer IP header confidentiality
E. outer IP header authentication
[多项选择]Which three IP addresses can be assigned to hosts if the subnet mask is /27 and subnet zero is usable?()
A. 10.15.32.17
B. 17.15.66.128
C. 66.55.128.1
D. 135.1.64.34
E. 129.33.192.192
F. 192.168.5.63