单项选择题
A. Create a backup of the database and recover all corrupted blocks found in the backup.
B. Run a backup validation and list all the logically corrupt blocks as well as physically corrupt blocks in the database.
C. Run a backup validation to populate V$COPY_CORRUPTION view, and then list any corrupt blocks recorded in the view.
D. Run a backup validation to populate V$DATABASE_BLOCK_CORRUPTION view, and then repair any corrupt blocks recorded in the view.
E. Run a backup validation, repair any corrupt blocks found during the validation process, and then update V$DATABASE_BLOCK_CORRUPTION view to indicate which corrupt blocks have been repaired.
单项选择题 Whatpurposewouldyouachievebyenablingtheblockchangetrackingfeature?()
单项选择题 Adatafilebecomecorruptedinyourdatabaseduetobadsectorsonthedisk.Becauseofcorruption,youlostalltheimportanttablesinthatdatafile.Whichmethodwouldyouuseforrecovery?()
单项选择题 Exhibit: View the Exhibit and examine the characteristic of the USERS tablespace. You observe that a large volume of inserts and deletes are happening on the TRANS table in the USERS tablespace and you suspect that the TRANS table is fragmented. Which advisory component would you refer to, in order to find information about table fragmentation?()