Deck 15: Backup and Recovery

Full screen (f)
exit full mode
Question
There are other methods of performing consistent backups,such as using export utilities,which by definition are cold backups.
Use Space or
up arrow
down arrow
to flip the card.
Question
Recovery of a controlfile does not actually involve any kind of recovery process,but rather one of restoration or rebuilding of the controlfile.
Question
Restoration of a recovered backup is a simple process of applying redo log entries to the datafile,until the datafile "catches up" to the time indicated by the archive log.
Question
The redo log files are typically covered for backups by simply duplexing redo log groups to have multiple members in each group.
Question
An abort shutdown of a database,or a power failure,kills all processes and clears all memory buffers immediately,regardless of what is executing in the database.
Question
OLTP databases are often required to be available on a 24-hour basis.
Question
Copying redo log files from a cold backup back into a database is only necessary when redo log files have been lost.
Question
Redo log files should be backed up for a hot backup,when the database is completely shut down to provide a snapshot of the entire database.
Question
Archive log files contain older records of transactions performed in the database.
Question
You should never multiplex controlfiles.
Question
A hot backup takes a snapshot of the entire physical structure of a database (all the datafiles,controlfiles,redo logs,and archive logs);if the database is not shut down,and any changes are made during the copy process,an inconsistent backup will result.
Question
Restoration can utilize entries in both redo log files and archive log files to complete a recovery.
Question
If a datafile is restored from a backup,then the controlfile will be behind of the datafile in time.
Question
The export utility is capable of recovering individual objects using log entries.
Question
User and application errors are usually object-centric,such as the dropping of a table.
Question
In Oracle Database,restarting the database will always recover from a SHUTDOWN ABORT or a power failure.
Question
If records are not available in archive log files,they are likely to be stored in undo logs.
Question
A cold backup takes a snapshot of a database,or preferably a part of a database,one file or type of file at a time.
Question
A hot backup is not necessarily a consistent backup across all the files in the backup (if the entire database is backed up in this manner).
Question
All of datafiles,archive logs,and redo logs can be recovered from a backup,but preferably not all.
Question
The export utility cannot be used to create a consistent backup.
Question
A(n)____ backup is a backup performed when the database is online,active,and available for use.

A) cold
B) hot
C) online
D) active
Question
____ is the process of making some kind of copies of parts of a database,or an entire database.

A) Backup
B) Restoration
C) Recovery
D) Rollback
Question
A(n)____ backup or recovery requires a database to be completely shut down for the backup,and sometimes the recovery process as well.

A) cold
B) hot
C) automated
D) manual
Question
Typically,many database installations will use a combination of both disk and tape backup storage.
Question
Oracle backup and recovery is actually broken up into ____ separate actions.

A) three
B) four
C) five
D) six
Question
Smaller redo log entries cause redo logs to switch more often,producing more archive logs more often.
Question
The redo log buffer is always larger than the database buffer cache.
Question
____ is the process of copying files from a backup.

A) Backup
B) Restoration
C) Recovery
D) Rollback
Question
Placing a tablespace into backup mode forces all change activity for that tablespace to be copied to the redo logs.
Question
The shorter the time between successive checkpoints,the more transactional changes to a database you could lose.
Question
Loss of an individual table is simple to recover if you have an export.
Question
The redo logs and ____ logs consist of records of all transactions made to a database.

A) backup
B) recovery
C) undo
D) archive
Question
Typically OLTP databases are customer facing,whereas a data warehouse contains historical information.
Question
____ is the process of rebuilding a database after some part of a database has been lost.

A) Backup
B) Restoration
C) Recovery
D) Rollback
Question
Flashback technology is potentially much faster in recovery times than traditional file restoration,combined with log entry records recovery.
Question
____ logs are copies of old redo log files,copied just before redo log files are reused.

A) Archive
B) Recovery
C) Control
D) Undo
Question
Cold backups,especially in the case of using RMAN,can allow for recovery of failure due to partial errors such as a single disk failure in a collection of disks,or the loss of a single table.
Question
If you ever need to restore from a cold backup,you would need to restore at least all the datafiles and controlfiles.
Question
A(n)____ backup is the easiest method of backup and recovery.

A) cold
B) hot
C) automated
D) manual
Question
A ____ standby database passes newly created archive log files to a standby database server computer.Those archive logs are then applied on the standby database computer to the standby database.

A) temporary
B) manual
C) physical
D) backup
Question
The ____________________ contain pointers to datafiles,dictating where datafiles should be in relation to redo log entries.
Question
Flashback technology relies generally on a combination of undo data,and ____.

A) archive logs
B) redo logs
C) the recycle bin
D) undo logs
Question
Redo logs should always be ____.

A) multiplexed
B) replicated
C) duplexed
D) normalized
Question
The UNDO and TEMP tablespaces are usually only backed up during a ____ backup because of the flexible nature of their contents.

A) tablespace
B) consistent
C) hot
D) cold
Question
____ logs are files that are copied from redo logs when a redo log file is switched out for recycling.

A) Archive
B) Undo
C) Backup
D) Recovery
Question
A(n)____ standby database can potentially pass log entries to a standby database server,log entry by log entry.In other words,each transaction is applied to the standby immediately after application to the primary database.

A) dynamic
B) online
C) logical
D) physical
Question
In a ____ replicated database architecture,any changes made to any one of the databases are replicated to all other databases in the replication architectural structure.

A) slave-to-slave
B) slave-to-master
C) master-to-slave
D) master-to-master
Question
A ____ is a point in time where all buffers are flushed to disk.

A) milestone
B) checkpoint
C) snapshot
D) saveguard
Question
The ____________________ process is essentially the application of redo log entries,from both redo log files and archive log files,back into the datafiles.
Question
____ failure is much more likely than any other failure situation,such as dropping a table that should not be dropped.

A) Media
B) User and Application
C) Backup
D) Oracle Database-Induced
Question
____ failure is rare because of many modern striping and mirroring utilities using specialized hardware such as RAID arrays.

A) Media
B) User
C) Application
D) Oracle Database-Induced
Question
Making a consistent copy of redo log files during a(n)____________________ backup is pointless,as a consistent snapshot of inactive redo log files is not possible.
Question
____ failure can sometimes be the result of a bug or an overload applied to the database itself.

A) Media
B) User
C) Application
D) Oracle Database-Induced
Question
____________________ is the process of executing procedures in Oracle Database to update the recovered backup files to an up to date state.
Question
____ failure can be due to an administrator-induced problem,such as repetitive use of the SHUTDOWN ABORT command,or pulling the power plug out of the wall.

A) Media
B) User
C) Application
D) Oracle Database-Induced
Question
A ____ backup is the same as a snapshot.The only difference is that the export utility performs a logical backup,not a physical backup.

A) checkpoint
B) manual
C) tablespace
D) consistent
Question
A ____ backup creates both DDL commands and DML commands,to re-create a database object (it uses the database SQL engine).

A) tablespace
B) logical
C) physical
D) consistent
Question
A type of hot backup is a ____ backup,for which you switch a tablespace into a special mode called backup mode.

A) tablespace
B) logical
C) physical
D) consistent
Question
____ logs contain entries of all transactional activity in a database as transactions occur.

A) Archive
B) Redo
C) Transactional
D) Undo
Question
The primary function of ____________________ is controlled distribution of data over a WAN.
Question
You should always ____________________ controlfile so you have a copy that can simply be plugged into a shutdown database.
Question
Loss of an application datafile includes any non-system tablespace,excluding the ____________________ and the SYSAUX tablespace.
Question
____________________ failure is storage device failure,such as when a disk fails,and denies your database access to one,some,or all of the files in your database.
Question
A(n)____________________ tablespace is a physical copy of a tablespace (containing data),plus an export utility dump of metadata (from the SYSTEM tablespace).
Question
Restoring of redo log files or archive log files means simply placing copies back into their respective ____________________,within the database structure in the operating system.
Question
You can create a backup that is ____________________ (recoverable)by applying log entries to datafiles,based on SCN matches between datafiles,controlfiles,and redo log entries.
Question
____________________ recovery automatically passes through redo logs,archive logs,and even undo space,allowing recovery on specific parts of a database to be restored,or even locked during a period to logically restore a single table.
Question
RMAN stands for ____________________.
Question
A(n)computer ____________________ differs from a cluster in that there is no common shared storage area.
Question
The objective of a(n)____________________ backup is to obtain a snapshot of all data in the database.
Question
A database must be in ____________________ to duplicate redo logs to archive logs.
Question
A(n)____________________ is a little like a Unix pipe where data can simply be pushed onto the pipe and pulled off the pipe at the other end of it.
Question
A(n)____________________ backup is made of pieces of a database (different files),where those files making up a complete database backup are not recoverable to a working database as a group.
Question
A point that a recovery is processed up to,is represented in the controlfile as a(n)____________________ (SCN).
Question
A(n)____________________ database is a backup database,which can be used to replace a primary customer facing database virtually in seconds,and even automatically,in the event of a primary database failure.
Question
A(n)_________________________ is a sequential number applied to every logged change to a database.
Question
A(n)____________________ backup is often made to make infrequent but extremely reliable copies of an Oracle database,most often when a database is periodically inactive and generally small in physical size.
Question
Recovery can be executed up to a point,but an automated recovery will use ______________________________ to determine what is updated,and up to when.
Question
____________________ environments consisting of multiple nodes can be useful if one node fails,in which case another node assumes the node of both the failed node and of itself.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/86
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 15: Backup and Recovery
1
There are other methods of performing consistent backups,such as using export utilities,which by definition are cold backups.
False
2
Recovery of a controlfile does not actually involve any kind of recovery process,but rather one of restoration or rebuilding of the controlfile.
True
3
Restoration of a recovered backup is a simple process of applying redo log entries to the datafile,until the datafile "catches up" to the time indicated by the archive log.
False
4
The redo log files are typically covered for backups by simply duplexing redo log groups to have multiple members in each group.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
5
An abort shutdown of a database,or a power failure,kills all processes and clears all memory buffers immediately,regardless of what is executing in the database.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
6
OLTP databases are often required to be available on a 24-hour basis.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
7
Copying redo log files from a cold backup back into a database is only necessary when redo log files have been lost.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
8
Redo log files should be backed up for a hot backup,when the database is completely shut down to provide a snapshot of the entire database.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
9
Archive log files contain older records of transactions performed in the database.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
10
You should never multiplex controlfiles.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
11
A hot backup takes a snapshot of the entire physical structure of a database (all the datafiles,controlfiles,redo logs,and archive logs);if the database is not shut down,and any changes are made during the copy process,an inconsistent backup will result.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
12
Restoration can utilize entries in both redo log files and archive log files to complete a recovery.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
13
If a datafile is restored from a backup,then the controlfile will be behind of the datafile in time.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
14
The export utility is capable of recovering individual objects using log entries.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
15
User and application errors are usually object-centric,such as the dropping of a table.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
16
In Oracle Database,restarting the database will always recover from a SHUTDOWN ABORT or a power failure.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
17
If records are not available in archive log files,they are likely to be stored in undo logs.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
18
A cold backup takes a snapshot of a database,or preferably a part of a database,one file or type of file at a time.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
19
A hot backup is not necessarily a consistent backup across all the files in the backup (if the entire database is backed up in this manner).
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
20
All of datafiles,archive logs,and redo logs can be recovered from a backup,but preferably not all.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
21
The export utility cannot be used to create a consistent backup.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
22
A(n)____ backup is a backup performed when the database is online,active,and available for use.

A) cold
B) hot
C) online
D) active
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
23
____ is the process of making some kind of copies of parts of a database,or an entire database.

A) Backup
B) Restoration
C) Recovery
D) Rollback
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
24
A(n)____ backup or recovery requires a database to be completely shut down for the backup,and sometimes the recovery process as well.

A) cold
B) hot
C) automated
D) manual
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
25
Typically,many database installations will use a combination of both disk and tape backup storage.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
26
Oracle backup and recovery is actually broken up into ____ separate actions.

A) three
B) four
C) five
D) six
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
27
Smaller redo log entries cause redo logs to switch more often,producing more archive logs more often.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
28
The redo log buffer is always larger than the database buffer cache.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
29
____ is the process of copying files from a backup.

A) Backup
B) Restoration
C) Recovery
D) Rollback
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
30
Placing a tablespace into backup mode forces all change activity for that tablespace to be copied to the redo logs.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
31
The shorter the time between successive checkpoints,the more transactional changes to a database you could lose.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
32
Loss of an individual table is simple to recover if you have an export.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
33
The redo logs and ____ logs consist of records of all transactions made to a database.

A) backup
B) recovery
C) undo
D) archive
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
34
Typically OLTP databases are customer facing,whereas a data warehouse contains historical information.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
35
____ is the process of rebuilding a database after some part of a database has been lost.

A) Backup
B) Restoration
C) Recovery
D) Rollback
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
36
Flashback technology is potentially much faster in recovery times than traditional file restoration,combined with log entry records recovery.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
37
____ logs are copies of old redo log files,copied just before redo log files are reused.

A) Archive
B) Recovery
C) Control
D) Undo
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
38
Cold backups,especially in the case of using RMAN,can allow for recovery of failure due to partial errors such as a single disk failure in a collection of disks,or the loss of a single table.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
39
If you ever need to restore from a cold backup,you would need to restore at least all the datafiles and controlfiles.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
40
A(n)____ backup is the easiest method of backup and recovery.

A) cold
B) hot
C) automated
D) manual
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
41
A ____ standby database passes newly created archive log files to a standby database server computer.Those archive logs are then applied on the standby database computer to the standby database.

A) temporary
B) manual
C) physical
D) backup
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
42
The ____________________ contain pointers to datafiles,dictating where datafiles should be in relation to redo log entries.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
43
Flashback technology relies generally on a combination of undo data,and ____.

A) archive logs
B) redo logs
C) the recycle bin
D) undo logs
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
44
Redo logs should always be ____.

A) multiplexed
B) replicated
C) duplexed
D) normalized
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
45
The UNDO and TEMP tablespaces are usually only backed up during a ____ backup because of the flexible nature of their contents.

A) tablespace
B) consistent
C) hot
D) cold
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
46
____ logs are files that are copied from redo logs when a redo log file is switched out for recycling.

A) Archive
B) Undo
C) Backup
D) Recovery
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
47
A(n)____ standby database can potentially pass log entries to a standby database server,log entry by log entry.In other words,each transaction is applied to the standby immediately after application to the primary database.

A) dynamic
B) online
C) logical
D) physical
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
48
In a ____ replicated database architecture,any changes made to any one of the databases are replicated to all other databases in the replication architectural structure.

A) slave-to-slave
B) slave-to-master
C) master-to-slave
D) master-to-master
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
49
A ____ is a point in time where all buffers are flushed to disk.

A) milestone
B) checkpoint
C) snapshot
D) saveguard
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
50
The ____________________ process is essentially the application of redo log entries,from both redo log files and archive log files,back into the datafiles.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
51
____ failure is much more likely than any other failure situation,such as dropping a table that should not be dropped.

A) Media
B) User and Application
C) Backup
D) Oracle Database-Induced
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
52
____ failure is rare because of many modern striping and mirroring utilities using specialized hardware such as RAID arrays.

A) Media
B) User
C) Application
D) Oracle Database-Induced
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
53
Making a consistent copy of redo log files during a(n)____________________ backup is pointless,as a consistent snapshot of inactive redo log files is not possible.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
54
____ failure can sometimes be the result of a bug or an overload applied to the database itself.

A) Media
B) User
C) Application
D) Oracle Database-Induced
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
55
____________________ is the process of executing procedures in Oracle Database to update the recovered backup files to an up to date state.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
56
____ failure can be due to an administrator-induced problem,such as repetitive use of the SHUTDOWN ABORT command,or pulling the power plug out of the wall.

A) Media
B) User
C) Application
D) Oracle Database-Induced
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
57
A ____ backup is the same as a snapshot.The only difference is that the export utility performs a logical backup,not a physical backup.

A) checkpoint
B) manual
C) tablespace
D) consistent
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
58
A ____ backup creates both DDL commands and DML commands,to re-create a database object (it uses the database SQL engine).

A) tablespace
B) logical
C) physical
D) consistent
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
59
A type of hot backup is a ____ backup,for which you switch a tablespace into a special mode called backup mode.

A) tablespace
B) logical
C) physical
D) consistent
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
60
____ logs contain entries of all transactional activity in a database as transactions occur.

A) Archive
B) Redo
C) Transactional
D) Undo
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
61
The primary function of ____________________ is controlled distribution of data over a WAN.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
62
You should always ____________________ controlfile so you have a copy that can simply be plugged into a shutdown database.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
63
Loss of an application datafile includes any non-system tablespace,excluding the ____________________ and the SYSAUX tablespace.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
64
____________________ failure is storage device failure,such as when a disk fails,and denies your database access to one,some,or all of the files in your database.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
65
A(n)____________________ tablespace is a physical copy of a tablespace (containing data),plus an export utility dump of metadata (from the SYSTEM tablespace).
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
66
Restoring of redo log files or archive log files means simply placing copies back into their respective ____________________,within the database structure in the operating system.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
67
You can create a backup that is ____________________ (recoverable)by applying log entries to datafiles,based on SCN matches between datafiles,controlfiles,and redo log entries.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
68
____________________ recovery automatically passes through redo logs,archive logs,and even undo space,allowing recovery on specific parts of a database to be restored,or even locked during a period to logically restore a single table.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
69
RMAN stands for ____________________.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
70
A(n)computer ____________________ differs from a cluster in that there is no common shared storage area.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
71
The objective of a(n)____________________ backup is to obtain a snapshot of all data in the database.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
72
A database must be in ____________________ to duplicate redo logs to archive logs.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
73
A(n)____________________ is a little like a Unix pipe where data can simply be pushed onto the pipe and pulled off the pipe at the other end of it.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
74
A(n)____________________ backup is made of pieces of a database (different files),where those files making up a complete database backup are not recoverable to a working database as a group.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
75
A point that a recovery is processed up to,is represented in the controlfile as a(n)____________________ (SCN).
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
76
A(n)____________________ database is a backup database,which can be used to replace a primary customer facing database virtually in seconds,and even automatically,in the event of a primary database failure.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
77
A(n)_________________________ is a sequential number applied to every logged change to a database.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
78
A(n)____________________ backup is often made to make infrequent but extremely reliable copies of an Oracle database,most often when a database is periodically inactive and generally small in physical size.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
79
Recovery can be executed up to a point,but an automated recovery will use ______________________________ to determine what is updated,and up to when.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
80
____________________ environments consisting of multiple nodes can be useful if one node fails,in which case another node assumes the node of both the failed node and of itself.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 86 flashcards in this deck.