0
Alien head

programming languages Online Quiz - 81

Description: programming languages Online Quiz - 81
Number of Questions: 20
Created by:
Tags: programming languages
Attempted 0/20 Correct 0 Score 0

Which three information are to be mandatorily provided while creating a new listener using Enterprise Manager Database Control?

  1. The database services to be registered with the listener

  2. The log file and trace file destination for the listener.

  3. The protocol used by the listener

  4. The server name where the listener runs.

  5. The port used by the listener.


Correct Option: C,D,E

Which two statements are true about the role in Oracle Database?

  1. A role can contain both system and object privileges.

  2. A role cannot be assigned external authentication.

  3. A role can be granted to itself.

  4. Roles are owned by the SYS user

  5. Roles can be granted to other roles


Correct Option: A,E

The junior DBA of your organization has accidentally deleted the alert log file. What will you do to create new alert log file?

  1. Create the new text file as ALERT.log

  2. You have to recover the alert log file from the valid backup.

  3. No action required. The file will be created automatically by the instance.

  4. Change the value for the BACKGROUND_DUMP_DEST parameter.


Correct Option: C

You want the user APP_DBA to administer the oracle database from remote machine. APP_DBA is granted SYSDBA privilege to perform administrative task on the database. Which file is used by oracle database server to authenticate APP_DBA?

  1. Control file and password file

  2. Password file

  3. Control file

  4. Listener control file


Correct Option: B

Which two statements about recovery manager (RMAN) backup are true?

  1. Online redo log files can be backed up

  2. RMAN backup can be taken only if the database is configured in ARCHIEVELOG mode.

  3. Only used data blocks can be backed up as backup sets

  4. Archived redo log files are backed up.

  5. Only consistent database backed up can be performed.


Correct Option: C,D

Which is the correct description of the significance of the ORACLE_HOME environment variable?

  1. It specifies the directory containing the oracle managed files

  2. It specifies the directory for database files, if not specified explicitly

  3. It specifies the directory containing the oracle software

  4. It specifies the directory of Optimal Flexible Architecture.


Correct Option: C

What four data protection components have been enhanced in Oracle database 10g release 2

  1. Flashback

  2. Data guard

  3. ASM

  4. Tivoli data protection

  5. Flash recovery


Correct Option: A,B,C,E

Which is the memory area that is created when a dedicated server process is started, and contains data and information for that server process?

  1. SGA

  2. Streams Pool

  3. PGA

  4. Shared Pool


Correct Option: C

Your database is in NOARCHIEVELOG mode. After which two operations you should take backup of control file? ( choose two)

  1. Adding a new user to database

  2. Adding a new tablespace to database.

  3. Dropping a table from the database.

  4. Dropping a user from the database.

  5. Dropping a datafile from a tablespace.


Correct Option: B,E

Which two operations can be flashed back using Flashback Technology?

  1. DROP TABLESPACE USERS

  2. ALTER TABLE SALES_REP DROP PARTITION P1

  3. DROP TABLE EMPLOYEES

  4. DROP USER SMITH

  5. ALTER TABLE EMPLOYEES DROP COLUMN DESIGN_ID


Correct Option: C,D

You want to refer the employee personal information stored in Operating System files EMPLOYEE table. You plan to add a new column in EMPLOYEE table to achieve this. Which data type would you use for the new column?

  1. BFILE

  2. BLOB

  3. CLOB

  4. LONG RAW


Correct Option: A

You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who performing the transactions and the values used in the transactions. Also you plan to transfer these values to another table for analysis. How would you achieve this?

  1. By auditing the all DML operations on table.

  2. By using external table

  3. By using triggers.

  4. By using anonymous PL/SQL blocks


Correct Option: C

Which things should be considered while deciding the size of undo tablespace in your database ( choose three)

  1. The size of an undo block

  2. The size of the redo log files

  3. The size of the database buffer cache.

  4. The value of the UNDO_RETENTION parameter.

  5. Undo blocks generated per second.


Correct Option: A,D,E

HQL is used in ?

  1. Session.createQuery();

  2. Session.createCriteria();

  3. Session.createSQLQuery();

  4. Session.lod();


Correct Option: A

what is the default value in hibernate ?

  1. lazy=false;

  2. lazy=true;

  3. lazy=yes;

  4. lazy=no;


Correct Option: B

Batch fetching is useful incase of ?

  1. lazy="true"

  2. lazy="false"

  3. lazy="on"

  4. lazy="off"


Correct Option: A

hibernate.cache.use_query_cache setting true enable cache regions ?

  1. StandardQueryCache and UpdateTimestampsCache

  2. StandardQueryCache

  3. QueryCache

  4. QueryCache and TimestampsCache


Correct Option: A

What is the root level element in a hibernate mapping file?

  1. None


Correct Option: C

It is possible to re-load an object and all its collections at any time, using the xxxx() method. This is useful when database triggers are used to initialize some of the properties of the object.What is the xxxx() method ?

  1. refresh();

  2. flush();

  3. fetch();

  4. load()


Correct Option: A

How can the mapping files be configured in Hibernate?

  1. Mapping files can be added to Configuration in the application code

  2. They can be configured in hibernate.cfg.xml using the elements

  3. Both a and b

  4. None of the above


Correct Option: C
+ View questions