A. Tools are no longer able to connect to a stopped instance.
B. User with DWROLE can still access the database.
C. CPU billing is halted based on full-hour cycles of usage.
D. In-flight transactions and queries are stopped.
A. Access to Database Actions is available for all users of Autonomous Database.
B. SQL Developer Web is available exclusively on the Autonomous Database.
C. Database Actions is accessible from a server running on the same virtual cloud network (VCN) when the Autonomous Database is configured with Private Endpoint networking.
D. Oracle APEX can be accessed only from the Developer menu in the Service Console.
E. Oracle Machine Learning is available only with Autonomous Data Warehouse (ADW) Database.
A. Active transactions in Autonomous Data Warehouse are paused
B. Active transactions are paused
C. Active transactions are terminated and rolled back
D. Active transactions continue running unaffected
E. Scaling can happen while there are active transactions in the database
A. Create a single alarm for each metric.
B. Select the correct alarm interval for your metric.
C. Create multiple alarm metrics.
D. Use a single interval for all alarms.
E. Routinely tune your alarms.
F. Suppress alarms during investigations.
A. Application User Creation
B. Database Upgrades
C. Data Loading
D. Backups
E. Firmware Patching
A. DWROLE
B. ADMIN
C. ADWC
D. ADBDEV
A. Oracle Cloud Infrastructure Object Storage Classic
B. Google Cloud Storage
C. Oracle Cloud Infrastructure Object Storage
D. Amazon S3
A. An Autonomous Database with private endpoints can be accessed from the public internet by
B. Private Endpoints can be configured when you clone a Shared Autonomous Database that was
C. A Network Security Group is required within your Virtual Cloud Network before you can provision a
D. You can configure Private Endpoints for an Always Free Autonomous Database
A. An "INSERT" REST call
B. A "POST" REST call
C. A "PUT" REST call
D. A "GET" REST call
A. It doesn't matter, but you must Install the JCE Unlimited Strength Policy Files.
B. Java Development Kit Version 8 or higher
C. JDBC .Jar files are specific to each platform.
D. JDBC drivers do NOT support multiple Java Developer Kit versions.
E. Java Development Kit Version 7
A. Wallet file
B. Username and password
C. Service name
D. Database name
A. The Autonomous Database must belong to a Network Security Group (NSG).
B. The Autonomous Database must be in the same VCN and Subnet as the Compute instance.
C. A Private Endpoint is required to connect to the Shared-Autonomous Database.
D. The OCI compute instance can be used with an Always-Free Autonomous Database account.
E. The OCI compute instance does not support connecting to a Shared Autonomous Database.
A. OS
B. 1-25 X OCPU
C. 20 X OCPU
D. unlimited
A. If "Clipboard" is selected as the "Output," the output will be placed on the system clipboard, so that it can be pasted into a file, a command line, or other location appropriate for the format.
B. Export DDL includes features such as "Show schema," "Storage," and "Terminator."
C. If "Grants" is checked as a DDL Option, GRANT statements are included for any grant objects on the exported objects, including those owned by the SYS schema.
D. If "Dependents" is checked as a DDL Option, for non-privileged users, only dependent objects in their schema are exported.
A. Level of concurrency
B. Amount of storage
C. I/O resources
D. Number of OCPUs displayed in the console.
E. parallelism settings
A. You can configure private endpoints for an Always Free Autonomous Database
B. An Autonomous Database with private endpoints can be accessed from the public Internet by adding your IP address to an Access Control List (ACL)
C. Private endpoints can be configured when you clone an Autonomous Database on Shared Infrastructure that was initially created with public endpoints
D. A Network Security Group (NSG) is required within your virtual cloud network before you can provision a Shared Autonomous Database to use private endpoints
A. Users have OS access to the database machine.
B. Users have SYS privileges in the database.
C. It offers greater control and isolation starting at the Exadata cloud infrastructure level.
D. Users can customize the OS stack and add additional packages
E. Users can customize the maintenance schedule.
A. Autonomous Data Warehouse
B. Neither service ignores hints by default
C. Both services ignore hints by default
D. Autonomous Transaction Processing
A. In a separate key vault external to the Exadata Infrastructure
B. inside the Autonomous Database wallet
C. on the Exadata Infrastructure where Autonomous Database Dedicated is hosted
D. inside the backups of the container database
A. Parquet
B. DOC
C. CSV
D. AVRO
E. DDL
F. JSON