An application writes to a log file in the /logs filesystem that is full. After the log file is deleted,‘df’ still shows the filesystem as 100% full. What is the likely cause of the problem and what will resolve it?()
第1题:
An application writes to a log file in the /logs filesystem that is full. After the log file is deleted, 'df' still shows the filesystem as 100% full. What is the likely cause of the problem and what will resolve it?()
第2题:
A TCP/IP application is transferring files from a personal machine to a remote machine. The application writes 32 kilobytes of data at a time to the socket, but has not issued a system call to set the window size. Which of the following procedures should be performed on the personal machine to increase the throughput of the application?()
第3题:
在建立Application对象的时候会产生哪个事件?()
第4题:
Sometimes performance is more important than availability (e.g., in cases where the data can be easily re-created). Which of the following is the appropriate disk configuration for an application that requires faster writes over availability()
第5题:
As part of fallover testing of a corporate database server, client application connectivity must be verified. Which of the following would best verify the application functionality?()
第6题:
Which two statements about the background process of the database writer are true()
第7题:
You recently installed an application on your computer. The application is configured to automatically start. This application might cause your computer to run slower. You need to prevent the application from auto starting without uninstalling the application. What should you do?()
第8题:
Perform a ping client verification test.
Review the number of active application processes.
Perform successful reads and writes to the application.
Run netstat -an to verify client connections to the listening ports.
第9题:
It is possible to have multiple database writers in an Oracle instance.
It writes dirty buffers, if any, to data files whenever a checkpoint occurs.
It writes dirty buffers, if any, to data files whenever a transaction commits.
It writes dirty buffers, if any, to data files before the log writer (LGWR) writes.
第10题:
Increase the size of thewall
Increase the size of sb_max
Increase the size of tcp_recvspace
Increase the size of tcp_sendspace
第11题:
The deleted file is still open by the application.The system must be rebooted before'df' will show the reduction in the filesystem.
The deleted file is still open by the application.The application must be stoppedbefore 'df' will show the reduction in the filesystem.
The filesystem is still marked as full in the /etc/fs.status file.The system must be rebooted before 'df' will show the reduction in the filesystem.
The filesystem is still marked as full in the /etc/fs.status file.The application must be stopped before 'df' will show the reduction in the filesystem.
第12题:
性 数 格
体 态 时
数 时 人称
格 体 时
第13题:
You are analyzing the components of the redo log mechanisms in your Oracle database. Which of the following purposes does the CKPT process serve?()
第14题:
Which statement is true about item records and inventory management? ()
第15题:
英语“He writes a letter”中动词writes中的s表示的语法意义是()。
第16题:
The WebSphere Commerce Payments architecture includes a Payment Servlet and a Payment Engine. The Payment Engine is the ONLY component that:()
第17题:
Sometimes performance is more important than availability (e.g., in cases where the data can be easily re-created). Which of the following is the appropriate disk configuration for an application that requires faster writes over availability?()
第18题:
Which two statements about the background process of thedatabase writerare true()
第19题:
You develop a Web application that writes data to a file on a server. You restrict access to the file to specific Windows users. The Web application runs as CONTOSO/ASPNET. You deny anonymous access to the application in IIS. You add the following XML segment in the Web.config file.You need to ensure that the application meets the following requirements:It must impersonate the user when it writes data to the file.It must run as CONTOSO/ASPNET when a user does not access the file. Which two actions should you perform? ()
第20题:
第21题:
It is possible to have multiple database writers in an Oracle instance.
It writes dirty buffers, if any, to data files whenever a checkpoint occurs.
It writes dirty buffers, if any, to data files whenever a transaction commits.
It writes dirty buffers, if any, to data files before the log writer (LGWR) writes
第22题:
ARCn
DBWn
CKPT
LGWR
PMON
SMON
第23题:
性
数
人称
格
第24题:
RAID-1
RAID-5
RAID-0+1
RAID-0