1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
JulijaS [17]
3 years ago
5

When is the redo log buffer written to the redo log file?

Computers and Technology
1 answer:
natka813 [3]3 years ago
5 0

Answer: B)The redo log buffer becomes one-third full.

Explanation:Redo log buffer is the type of buffer file that is present for storing the changes that have been done in data. Database changes are the made goes in the records of the redo entries.the change of the buffer to the redo files is done when the buffer contains change records which are full till the one-third section, thus conversion takes place from the redo buffer to the redo files.

You might be interested in
When you use the bufferedreader class, you must import the ____ package into your program?
BigorU [14]
When you use the bufferedreader class, you must import the java.io package into your program.  It is<span> an API that comes with </span>Java<span> which is aimed at reading and writing data (input and output). ... For instance, read data from a file and write to a file or write a response back over the network. The </span>Java IO<span> API is located in the </span>Java IO<span> package ( </span>java.io<span> ).</span>
5 0
3 years ago
A company currently uses Microsoft Active Directory as its identity provider. The company recently purchased Oracle Cloud Infras
I am Lyosha [343]

A company currently uses Microsoft Active Directory as its identity provider. The company recently purchased Oracle Cloud Infrastructure (OCI) to leverage the cloud platform for its test and development operations. As the administrator, you are now tasked with giving access only to developers so that they can start creating resources in their OCI accounts. The step to achieve this is :

<u>B. Federate all Microsoft Active Directory groups with OCI to allow users to use their existing credentials.</u>

<u />

Explanation:

  • Go to the AD FS Management Console and sign in to the account you want to federate.
  • Add Oracle Cloud Infrastructure as a trusted relying party: From the AD FS Management Console, right-click AD FS and select Add Relying Party Trust.
  • Oracle Cloud provides Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), and Data as a Service (DaaS). These services are used to build, deploy, integrate, and extend applications in the cloud.
  • You can federate multiple Active Directory accounts with Oracle Cloud Infrastructure, but each federation trust that you set up must be for a single Active Directory account.

4 0
3 years ago
Which soft skills would these mobile app developers need to use in the situations described?
Ber [7]

Answer:

1: work ethic/presentation.

2: communication.

3: adaptability.

4: creativity.

(these are all guesses so i'm not 100% sure)

Explanation:

6 0
3 years ago
Read 2 more answers
The algorithm for solving the problem of average of five (5) numbers​
PilotLPTM [1.2K]

Answer:

Explanation:

Denote the five numbers as a, b, c, d and e.

The average is:

(a + b + c + d +e) ÷ 5.

Easily:

Learn how to do input and output operations in your programming language of choice.

Learn what average is (see Arithmetic mean - Wikipedia)

Learn how to code arithmetic operations in your PL of choice.

Put all that together and code the program.

Oh, did you expect the code snippet? Sorry, I don’t do peoples’ homework for them on principle. Homework is for you to learn something. If you can’t be bothered, accept that you’ll fail your class. If you want to pass, LEARN.

3 0
3 years ago
13. Place where names, addresses and email information<br> is stored
yanalaym [24]

Answer in ur email

Explanation:

8 0
2 years ago
Other questions:
  • Can you know what time someone retweeted
    5·1 answer
  • Which certification can help enhance your job prospects in the role of a computer programmer?
    6·2 answers
  • You are holding a rock tied to a string, which is an example of a pendulum. identify and explain the proper term for each part o
    10·2 answers
  • Angle, oblique, regular, demi, roman, heavy, extra bold, expanded, and compressed are ___________ . Select one: A. type styles B
    10·1 answer
  • What is Napoleon's friend's full name? From the Napoleon Dynamite movie.
    9·2 answers
  • An ink-jet printer is a type of impact printer. <br> a. True <br> b. False
    8·1 answer
  • Downloading files is safe for most types of files except Select one: a. documents. b. pictures. c. executable files. d. music fi
    7·1 answer
  • ProgrammingAssignment3
    8·1 answer
  • Types of digital divide ​
    15·1 answer
  • When did time begin?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!