OCP 1Z0-043 Short Notes: Exam passing tips

Configuring Recovery Manager

  • The control file, target database catalog, and Recovery catalog is used to store the RMAN’s persistent settings.
  • The alert log file is used to find out the values of the changed parameters at the time of instance startup.
  • The NLS_LANG parameter must be set to specify the language, territory, and character set used in an application.
  • CONFIGURE RETENTION POLICY CLEAR is a command that will configure the retention policy to the default of REDUNDANCY 1.
  • CONFIGURE is an RMAN command that configures an RMAN environment.
  • The rman target/ command is used to maintain backup copies by connecting to the target database and returns the RMAN prompt to issue further backup commands.
  • The redo files are opened after executing the ALTER DATABASE OPEN command on a database when it is in MOUNT mode.

Understanding Globalization Support
Continue reading “OCP 1Z0-043 Short Notes: Exam passing tips”

Adobe 9A0-311 Short Notes: Exam passing tips

Planning and Design of Flash Applications

  • The Properties panel/Property inspector enables a user to access various attributes of whatever is currently selected on the stage or in the Timeline.
  • The DynamicHeapSize capability specifies the amount of dynamic memory that is allocated to Flash Lite.
  • The Align panel controls the space between the objects and the size of the objects in respect of each other.
  • The Distribute area of the Align panel spaces the objects according to a common reference point of top, middle or bottom.
  • Motion guide layers are special layers that enable a user to draw paths along which the objects can be animated.
  • Continue reading “Adobe 9A0-311 Short Notes: Exam passing tips”

CompTIA Security+ (SY0-101) Exam passing tips

General Security Concepts

    • Kerberos is an industry standard authentication protocol used to verify user or host identity.
    • Role-based access control (RBAC) is an access control model. In this model, a user can access resources according to his role in the organization.
    • Mandatory Access Control (MAC) is a model that uses a predefined set of access privileges for an object of the system.
    • Authentication is a process of verifying the identity of a person, network host, or system process. The authentication process compares the provided credentials with the credentials stored in the database of an authentication server.
    • Certificate-based authentication is the most secure method of authentication. It provides stronger key for encryption as compared to Digest authentication and sends encrypted passwords across the network. This prevents unauthorized users from intercepting the passwords.
    • Anonymous authentication is generally used for public Internet Web sites. Using this method, a user can establish a connection with a Web server without providing username and password.
    • Authentication is a process of verifying the identity of a person, network host, or system process. The authentication process compares the provided credentials with the credentials stored in the database of an authentication server.
    • Password Authentication Protocol (PAP) transmits user credentials as plaintext.
    • A certificate is a digital representation of information that identifies authorized users on the Internet and intranets.

Continue reading “CompTIA Security+ (SY0-101) Exam passing tips”

OCP 1Z0-047 Short Notes: Exam passing tips

Retrieving data using the SQL SELECT statement and using single row functions to customize the output

  • /*…*/ and — are used to put comments in an Oracle program.
  • The CREATE TABLE does not end immediately with a semicolon, and a column name cannot start with a numeric value. However, a numeric value can be used in between a column name.
  • Name of a table cannot start with @ special character.
  • Knowing about the GROUP BY clause.

Using sub queries and set operators to solve queries, as well as DDL statements to create and manage tables

MCSD .NETMCAD .NETMCDBA 70-316 Short Notes & Tips

Creating User Services

  • The identity object of the IIdentity interface is used during the authentication process, when a user’s identity is verified. It contains information about a user who is being validated, such as username and password.
  • The principal object of the IPrincipal interface is used during the authentication process, when the application determines the data that can be accessed by a user and code to be executed. It contains information about a user’s identity, such as username and password, as well as information about a user’s role, such as manager or associate.
  • The correct sequence of the classes of the System.Windows.Forms namespace in descending order is as follows:
    1. Control
    2. ScrollableControl
    3. ContainerControl
    4. Forms
  • The MinimumSize property of the Form class is used to get or set the minimum size up to which a form can be resized.
  • Continue reading “MCSD .NETMCAD .NETMCDBA 70-316 Short Notes & Tips”