This preview shows page 1. Sign up to view the full content.
Unformatted text preview: : D,E,G
You want to create a new optimized database for your transactional production
environment to be used by a financial application. While creating the database, you
want the Oracle software to take care of all basic settings to optimize the database
performance. Which method would you use to achieve this objective?
A. Use the CREATE DATABASE .. command to create the database with
B. Use the Database Configuration Assistant (DBCA) to create the database with
C. Use Enterprise Manager to create a new database with the Online Transaction
Processing (OLTP) option.
D. Use Database Configuration Assistant (DBCA) to create the database with
Transaction Processing template.
E. Use the CREATE DATABASE .. command to create the database with Automatic
Storage Management (ASM) file system.
You observe that in your PROD database, customer information is being modified
by some unauthorized users. You want to keep track of all of the transactions
happening on the table using PL/SQL. Which type of PL/SQL subprogram or
construct would you use to accomplish this task?
D. database triggers
E. anonymous PL/SQL block
Actualtests.com - The Power of Knowing 1Z0-042 QUESTION 97:
You want to be notified when the space usage of an existing critical tablespace has
reached 75% of the allocated space. Which option would you use to achieve this?
A. run a procedure to check the tablespace space usage
B. define the warning threshold for the tablespace at 75% in Database Control
C. create a trigger to be executed when tablespace space usage reaches 75%
D. submit a job by using DBMS_JOB package to check the free space in the tablespace
at regular intervals
E. define the warning threshold to be 75% for the tablespace by ALTER TABLESPACE
.. ADD THRESHOLD command
You have been asked to create three users, PUB1, PUB2 and PUB3, for three newly
hired employees and to allocate unlimited quota on their default tablespace
PUBLISHER_TBS with no other privileges. After creating the users, which method
can you use for granting t...
View Full Document
This document was uploaded on 03/08/2014.
- Fall '09