0

programming languages Online Quiz - 81

Description: programming languages Online Quiz - 81
Number of Questions: 20
Created by:
Tags: programming languages
Attempted 0/20 Correct 0 Score 0

How can the mapping files be configured in Hibernate?

  1. Mapping files can be added to Configuration in the application code

  2. They can be configured in hibernate.cfg.xml using the elements

  3. Both a and b

  4. None of the above


Correct Option: C

It is possible to re-load an object and all its collections at any time, using the xxxx() method. This is useful when database triggers are used to initialize some of the properties of the object.What is the xxxx() method ?

  1. refresh();

  2. flush();

  3. fetch();

  4. load()


Correct Option: A

What is the root level element in a hibernate mapping file?

  1. None


Correct Option: C

hibernate.cache.use_query_cache setting true enable cache regions ?

  1. StandardQueryCache and UpdateTimestampsCache

  2. StandardQueryCache

  3. QueryCache

  4. QueryCache and TimestampsCache


Correct Option: A

Batch fetching is useful incase of ?

  1. lazy="true"

  2. lazy="false"

  3. lazy="on"

  4. lazy="off"


Correct Option: A

what is the default value in hibernate ?

  1. lazy=false;

  2. lazy=true;

  3. lazy=yes;

  4. lazy=no;


Correct Option: B

HQL is used in ?

  1. Session.createQuery();

  2. Session.createCriteria();

  3. Session.createSQLQuery();

  4. Session.lod();


Correct Option: A

Which things should be considered while deciding the size of undo tablespace in your database ( choose three)

  1. The size of an undo block

  2. The size of the redo log files

  3. The size of the database buffer cache.

  4. The value of the UNDO_RETENTION parameter.

  5. Undo blocks generated per second.


Correct Option: A,D,E

You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who performing the transactions and the values used in the transactions. Also you plan to transfer these values to another table for analysis. How would you achieve this?

  1. By auditing the all DML operations on table.

  2. By using external table

  3. By using triggers.

  4. By using anonymous PL/SQL blocks


Correct Option: C
Explanation:

To achieve the given objective, you can use triggers, which are special PL/SQL programs that are automatically executed in response to specific DML events.

Option A: Auditing the DML operations on the table would provide information about who performed the transactions, but it would not capture the values used in the transactions. Additionally, the auditing information may not be easily transferable to another table for analysis.

Option B: Using an external table would not help in tracking users who performed the transactions and the values used in the transactions. External tables are used to map data in flat files into database tables, or to query data in external sources as if it were in a table. They are not designed for capturing transaction details.

Option C: Using triggers would help you track the users who performed the transactions and the values used in the transactions. You can create a trigger to automatically insert a row into another table, such as an audit table, when a DML operation occurs on the original table. The inserted row can contain information such as the user who performed the transaction, the type of transaction (insert, update, or delete), the date and time of the transaction, and the values used in the transaction. This information can be used for analysis and to detect unauthorized activity.

Option D: Using anonymous PL/SQL blocks would not help in tracking users who performed the transactions and the values used in the transactions. Anonymous PL/SQL blocks are used to execute a sequence of SQL and PL/SQL statements and are not designed for capturing transaction details.

Therefore, the correct option is:

The Answer is: C. By using triggers.

You want to refer the employee personal information stored in Operating System files EMPLOYEE table. You plan to add a new column in EMPLOYEE table to achieve this. Which data type would you use for the new column?

  1. BFILE

  2. BLOB

  3. CLOB

  4. LONG RAW


Correct Option: A

Which two operations can be flashed back using Flashback Technology?

  1. DROP TABLESPACE USERS

  2. ALTER TABLE SALES_REP DROP PARTITION P1

  3. DROP TABLE EMPLOYEES

  4. DROP USER SMITH

  5. ALTER TABLE EMPLOYEES DROP COLUMN DESIGN_ID


Correct Option: C,D

AI Explanation

To answer this question, you need to understand the concept of Flashback Technology in Oracle Database.

Flashback Technology is a feature in Oracle Database that allows you to view and manipulate past data and database states. It provides a way to recover a database or a table to a previous point in time without the need for performing a complete database restoration.

Based on the given options, the two operations that can be flashed back using Flashback Technology are:

C. DROP TABLE EMPLOYEES - This option is correct because when you drop a table using the DROP TABLE statement, you can use Flashback Technology to recover the dropped table and its data. By using the FLASHBACK TABLE statement, you can restore the dropped table to a previous point in time.

D. DROP USER SMITH - This option is correct because when you drop a user using the DROP USER statement, you can use Flashback Technology to recover the dropped user and its objects. By using the FLASHBACK DATABASE statement, you can restore the dropped user and its objects to a previous point in time.

Therefore, the correct answer is C. DROP TABLE EMPLOYEES and D. DROP USER SMITH. These options can be flashed back using Flashback Technology.

Your database is in NOARCHIEVELOG mode. After which two operations you should take backup of control file? ( choose two)

  1. Adding a new user to database

  2. Adding a new tablespace to database.

  3. Dropping a table from the database.

  4. Dropping a user from the database.

  5. Dropping a datafile from a tablespace.


Correct Option: B,E

Which is the memory area that is created when a dedicated server process is started, and contains data and information for that server process?

  1. SGA

  2. Streams Pool

  3. PGA

  4. Shared Pool


Correct Option: C

What four data protection components have been enhanced in Oracle database 10g release 2

  1. Flashback

  2. Data guard

  3. ASM

  4. Tivoli data protection

  5. Flash recovery


Correct Option: A,B,C,E

Which is the correct description of the significance of the ORACLE_HOME environment variable?

  1. It specifies the directory containing the oracle managed files

  2. It specifies the directory for database files, if not specified explicitly

  3. It specifies the directory containing the oracle software

  4. It specifies the directory of Optimal Flexible Architecture.


Correct Option: C

Which two statements about recovery manager (RMAN) backup are true?

  1. Online redo log files can be backed up

  2. RMAN backup can be taken only if the database is configured in ARCHIEVELOG mode.

  3. Only used data blocks can be backed up as backup sets

  4. Archived redo log files are backed up.

  5. Only consistent database backed up can be performed.


Correct Option: C,D

You want the user APP_DBA to administer the oracle database from remote machine. APP_DBA is granted SYSDBA privilege to perform administrative task on the database. Which file is used by oracle database server to authenticate APP_DBA?

  1. Control file and password file

  2. Password file

  3. Control file

  4. Listener control file


Correct Option: B

The junior DBA of your organization has accidentally deleted the alert log file. What will you do to create new alert log file?

  1. Create the new text file as ALERT.log

  2. You have to recover the alert log file from the valid backup.

  3. No action required. The file will be created automatically by the instance.

  4. Change the value for the BACKGROUND_DUMP_DEST parameter.


Correct Option: C

Which two statements are true about the role in Oracle Database?

  1. A role can contain both system and object privileges.

  2. A role cannot be assigned external authentication.

  3. A role can be granted to itself.

  4. Roles are owned by the SYS user

  5. Roles can be granted to other roles


Correct Option: A,E

Which three information are to be mandatorily provided while creating a new listener using Enterprise Manager Database Control?

  1. The database services to be registered with the listener

  2. The log file and trace file destination for the listener.

  3. The protocol used by the listener

  4. The server name where the listener runs.

  5. The port used by the listener.


Correct Option: C,D,E
- Hide questions