programming languages Online Quiz - 81

Description: programming languages Online Quiz - 81
Number of Questions: 20
Created by:
Tags: programming languages
Attempted 0/20 Correct 0 Score 0

How can the mapping files be configured in Hibernate?

  1. Mapping files can be added to Configuration in the application code

  2. They can be configured in hibernate.cfg.xml using the elements

  3. Both a and b

  4. None of the above

Correct Option: C

It is possible to re-load an object and all its collections at any time, using the xxxx() method. This is useful when database triggers are used to initialize some of the properties of the object.What is the xxxx() method ?

  1. refresh();

  2. flush();

  3. fetch();

  4. load()

Correct Option: A

What is the root level element in a hibernate mapping file?

  1. None

Correct Option: C

hibernate.cache.use_query_cache setting true enable cache regions ?

  1. StandardQueryCache and UpdateTimestampsCache

  2. StandardQueryCache

  3. QueryCache

  4. QueryCache and TimestampsCache

Correct Option: A

Batch fetching is useful incase of ?

  1. lazy="true"

  2. lazy="false"

  3. lazy="on"

  4. lazy="off"

Correct Option: A

what is the default value in hibernate ?

  1. lazy=false;

  2. lazy=true;

  3. lazy=yes;

  4. lazy=no;

Correct Option: B

HQL is used in ?

  1. Session.createQuery();

  2. Session.createCriteria();

  3. Session.createSQLQuery();

  4. Session.lod();

Correct Option: A
  1. The size of an undo block

  2. The size of the redo log files

  3. The size of the database buffer cache.

  4. The value of the UNDO_RETENTION parameter.

  5. Undo blocks generated per second.

Correct Option: A,D,E

You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who performing the transactions and the values used in the transactions. Also you plan to transfer these values to another table for analysis. How would you achieve this?

  1. By auditing the all DML operations on table.

  2. By using external table

  3. By using triggers.

  4. By using anonymous PL/SQL blocks

Correct Option: C

Which two operations can be flashed back using Flashback Technology?






Correct Option: C,D
  1. Adding a new user to database

  2. Adding a new tablespace to database.

  3. Dropping a table from the database.

  4. Dropping a user from the database.

  5. Dropping a datafile from a tablespace.

Correct Option: B,E

Which is the memory area that is created when a dedicated server process is started, and contains data and information for that server process?

  1. SGA

  2. Streams Pool

  3. PGA

  4. Shared Pool

Correct Option: C
  1. Flashback

  2. Data guard

  3. ASM

  4. Tivoli data protection

  5. Flash recovery

Correct Option: A,B,C,E
  1. It specifies the directory containing the oracle managed files

  2. It specifies the directory for database files, if not specified explicitly

  3. It specifies the directory containing the oracle software

  4. It specifies the directory of Optimal Flexible Architecture.

Correct Option: C

Which two statements about recovery manager (RMAN) backup are true?

  1. Online redo log files can be backed up

  2. RMAN backup can be taken only if the database is configured in ARCHIEVELOG mode.

  3. Only used data blocks can be backed up as backup sets

  4. Archived redo log files are backed up.

  5. Only consistent database backed up can be performed.

Correct Option: C,D

You want the user APP_DBA to administer the oracle database from remote machine. APP_DBA is granted SYSDBA privilege to perform administrative task on the database. Which file is used by oracle database server to authenticate APP_DBA?

  1. Control file and password file

  2. Password file

  3. Control file

  4. Listener control file

Correct Option: B

The junior DBA of your organization has accidentally deleted the alert log file. What will you do to create new alert log file?

  1. Create the new text file as ALERT.log

  2. You have to recover the alert log file from the valid backup.

  3. No action required. The file will be created automatically by the instance.

  4. Change the value for the BACKGROUND_DUMP_DEST parameter.

Correct Option: C

Which two statements are true about the role in Oracle Database?

  1. A role can contain both system and object privileges.

  2. A role cannot be assigned external authentication.

  3. A role can be granted to itself.

  4. Roles are owned by the SYS user

  5. Roles can be granted to other roles

Correct Option: A,E

Which three information are to be mandatorily provided while creating a new listener using Enterprise Manager Database Control?

  1. The database services to be registered with the listener

  2. The log file and trace file destination for the listener.

  3. The protocol used by the listener

  4. The server name where the listener runs.

  5. The port used by the listener.

Correct Option: C,D,E
- Hide questions