Your success in Oracle 1Z0-883 is our sole target and we develop all our 1Z0-883 braindumps in a way that facilitates the attainment of this target. Not only is our 1Z0-883 study material the best you can find, it is also the most detailed and the most updated. 1Z0-883 Practice Exams for Oracle 1Z0-883 are written to the highest standards of technical accuracy.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Oracle 1Z0-883 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 1Z0-883 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/1Z0-883-exam-dumps.html
Q1. You are using CTIDS in replication. You need to skip a transaction with the CTID of aaa-bbb-ccc-ddd-eee : 3 on a slave.
Which command would you execute from a Mysql prompt?
A. STOP SLAVE;
SETGTID_NEXT=”aaa-bbb-ccc-ddd-eee: 3”;
BEGIN;
COMMIT;
SET GTID_NEXT=”AUTOMATIC”;
START SLAVE
B. STOP SLAVE;
SET GLOBAL SQL_SLAVE_SKIP_COUNTER=1;
START SLAVE;
C. STOP SLAVE;
BEGIN;
SET GTID_IGNORE=”aaa-bbb-ccc-ddd-eee: 3”;
COMMIT;
START SLAVE;
D. STOP SLAVE;
RESET SLAVE;
BEGIN;
SKIP NEXT GTID;
COMMIT;
START SLAVE;
Answer: B
Reference: http://blog.secaserver.com/2011/11/resync-mysql-masterslave-replication/
Q2. Which three tasks can be performed by using the performance Schema?
A. Finding queries that are not using indexes
B. Finding rows that are locked by InnoDB
C. Finding client connection attributes
D. Finding the part of a code in which a single query is spending time
E. Finding the size of each table
Answer: A,B,C
Q3. Consider the Mysql Enterprise Audit plugin.
A CSV file called data.csv has 100 rows of data.
The stored procedure prepare_db ( ) has 10 auditable statements.
You run the following statements in the mydb database:
Mysql> CALL prepare_db ( );
Mysql> LOAD DATA INFILE ‘/tmp/data.cav’ INTO TABLE mytable;
Mysql> SHOW TABLES;
How many events are added to the audit log as a result of the preceding statements?
A. 102; top-level statements are logged, but LOAD DATA INFILE is logged as a separate event.
B. 3; only the top-level statements are logged.
C. 111; top-level statements and all lower-level statements are logged.
D. 12; only top-level statements and stored procedure events are logged.
Answer: B
Reference: http://dev.mysql.com/doc/mysql-security-excerpt/5.5/en/audit-log-plugin-logging-control.html
Q4. Review the definition of the phone_list view.
CHEATE OR REPLACE ALGORITHM=MERGE DEFINER= ‘root’@localhost’ SQL SECURITY DEFINER VIEW ‘phone_list’ AS SELECT
e . id as id
‘e . first_name AS ‘first_name’
‘e . last_name AS ‘last_name’
‘coalesce ( ph1.phone_no, ‘--') AS ‘office_no’
‘coalesce (ph2 .phone_no, '--‘) AS ‘cell_no’
FROM employees e
LEFT JOIN employee_phone ph1
ON ph1.emp_id = e.id AND ph1.type = ‘office’
LEFT JOIN employee_phone ph2
ON ph2 .emp_id = e.id AND ph2 .type = ‘mobile’
The tables employees and employee_phone are InnoDB tables; all columns are used in this view.
The contents of the phone_list view are as follows:
Mysql> select * from phone_list;
1 row in set (0.00 sec)
Which method can you use to change the cell_no value to ‘555-8888’ for John Doe?
A. DELETE FROM phone_list WHERE first_name= ‘John’ and last_name= ‘Doe’; INSERT INTO phone_list (first_name, last_name, office_no, cell_no) VALUES (‘John’ , ‘Doe’ , ‘x1234’ , ‘555-8888);
B. INSERT INTO employee_phone (emp_id, phone_no, type) VALUES (1, ‘555-8888’,’mobile’);
C. UPDATE phone_list SET cell_name ‘555-8888’ WHERE first_name= ‘John’ and last_name= ‘Doe’;
D. UPDATE employee_phone SET phone_no= ‘555-8888’ where emp_id=1;
Answer: B
Q5. Consider the events_% tables in performance Schema.
Which two methods will clear or reset the collected events in the tables?
A. Using DELETE statements, for example, DELETE FROM performance_schema.events_watis_current;
B. Using the statement RESET PERFORMANCE CACHE;
C. Using the statement FLUSH PERFORMANCE CACHE;
D. Using TRUNCATE statements, for example, TRUNATE TABLE performance_schema.events_waits_current;
E. Disabling and re-enabling all instruments
F. Restarting Mysql
Answer: D,E
Reference: http://dev.mysql.com/doc/refman/5.5/en/performance-schema-timing.html
Q6. You have a server that has very limited memory but has a very large table.
You will use mysqldump to back up this table.
Which option will ensure mysqldump will process a row at a time instead of buffering a set of rows?
A. -- quick
B. -- skip-buffer
C. -- single-transaction
D. -- tab
Answer: C
Reference: http://dev.mysql.com/doc/refman/4.1/en/mysqldump.html
Q7. You inherit a legacy database system when the previous DBA, Bob, leaves the company. You are notified that users are getting the following error:
mysql> CALL film_in_stock (40, 2, @count);
ERROR 1449 (HY000): The user specified as a definer (‘bon’@’localhost’) does not exist
How would you identify all stored procedures that pose the same problem?
A. Execute SELECT * FROM mysql.routines WHERE DEFINER=’bob@localhost’;.
B. Execute SHOW ROUTINES WHERE DEFINER=’bob@localhost’.
C. Execute SELECT * FROM INFORMATION_SCHEMA. ROUTINES WHERE DEFINER=’bob@localhost’;.
D. Execute SELECT * FROM INFORMATION_SCHEMA. PROCESSLIST WHERE USER=’bob’ and HOST=’ localhost’;.
E. Examine the Mysql error log for other ERROR 1449 messages.
Answer: D
Q8. You are using replication and the binary log files on your master server consume a lot of disk space.
Which two steps should you perform to safely remove some of the older binary log files?
A. Ensure that none of the attached slaves are using any of the binary logs you want to delete.
B. Use the command PURGE BINARY LOGS and specify a binary log file name or a date and time to remove unused files.
C. Execute the PURGE BINARY LOGE NOT USED command.
D. Remove all of the binary log files that have a modification date earlier than today.
E. Edit the .index file to remove the files you want to delete.
Answer: D
Q9. In a design situation, there are multiple character sets that can properly encode your data. Which three should influence your choice of character set?
A. Disk usage when storing data
B. Syntax when writing queries involving JOINS
C. Comparing the encoded data with similar columns on other tables
D. Memory usage when working with the data
E. Character set mapping index hash size
Answer: C,D,E
Q10. Which three data components are needed for point-in-time recovery?
A. The error log
B. The backup log
C. The general query log
D. Binary logs
E. The data backup
F. Configuration files
Answer: D,E,F
