单项选择题
A. The BZIP2 compression algorithm consumes more CPU resources than the ZLIB compression algorithm.
B. The ZLIB compression algorithm consumes more CPU resources than the BZIP2 compression algorithm.
C. The ZLIB compression algorithm provides maximum compression and produces smaller backups than the BZIP2 compression algorithm.
D. Only the BZIP2 compression algorithm can be used to make compressed backups to disk.
单项选择题 You have the following requirements in relation to the detection of block corruption for your database instance: 1. Check for logical self-consistency of data blocks when modified in memory. 2. Checksums are calculated before and after the block change. 3. Checks are performed for the lost writes to the physical standby database. Which method would help you perform the above checks automatically? ()
单项选择题 To control the execution of a server process when it is receiving bad packets from a potentially malicious client, you set the SEC_PROTOCOL_ERROR_FURTHER_ACTION initialization parameter as follows: SQL> ALTER SYSTEM SET SEC_PROTOCOL_ERROR_FURTHER_ACTION = Drop,10; What is the significance of this setting?()
单项选择题 Examine the following command: ALTER DISKGROUP data MOUNT FORCE; In which scenario can you use the above command to mount the disk group? ()