programming languages Online Quiz - 81

Description: programming languages Online Quiz - 81
Number of Questions: 20
Created by:
Tags: programming languages
Attempted 0/20 Correct 0 Score 0

How can the mapping files be configured in Hibernate?

  1. Mapping files can be added to Configuration in the application code

  2. They can be configured in hibernate.cfg.xml using the elements

  3. Both a and b

  4. None of the above

Correct Option: C

It is possible to re-load an object and all its collections at any time, using the xxxx() method. This is useful when database triggers are used to initialize some of the properties of the object.What is the xxxx() method ?

  1. refresh();

  2. flush();

  3. fetch();

  4. load()

Correct Option: A

What is the root level element in a hibernate mapping file?

  1. None

Correct Option: C

hibernate.cache.use_query_cache setting true enable cache regions ?

  1. StandardQueryCache and UpdateTimestampsCache

  2. StandardQueryCache

  3. QueryCache

  4. QueryCache and TimestampsCache

Correct Option: A

Batch fetching is useful incase of ?

  1. lazy="true"

  2. lazy="false"

  3. lazy="on"

  4. lazy="off"

Correct Option: A

what is the default value in hibernate ?

  1. lazy=false;

  2. lazy=true;

  3. lazy=yes;

  4. lazy=no;

Correct Option: B

HQL is used in ?

  1. Session.createQuery();

  2. Session.createCriteria();

  3. Session.createSQLQuery();

  4. Session.lod();

Correct Option: A

Which things should be considered while deciding the size of undo tablespace in your database ( choose three)

  1. The size of an undo block

  2. The size of the redo log files

  3. The size of the database buffer cache.

  4. The value of the UNDO_RETENTION parameter.

  5. Undo blocks generated per second.

Correct Option: A,D,E

You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who performing the transactions and the values used in the transactions. Also you plan to transfer these values to another table for analysis. How would you achieve this?

  1. By auditing the all DML operations on table.

  2. By using external table

  3. By using triggers.

  4. By using anonymous PL/SQL blocks

Correct Option: C

You want to refer the employee personal information stored in Operating System files EMPLOYEE table. You plan to add a new column in EMPLOYEE table to achieve this. Which data type would you use for the new column?

  1. BFILE

  2. BLOB

  3. CLOB


Correct Option: A

Which two operations can be flashed back using Flashback Technology?






Correct Option: C,D

AI Explanation

To answer this question, you need to understand the concept of Flashback Technology in Oracle Database.

Flashback Technology is a feature in Oracle Database that allows you to view and manipulate past data and database states. It provides a way to recover a database or a table to a previous point in time without the need for performing a complete database restoration.

Based on the given options, the two operations that can be flashed back using Flashback Technology are:

C. DROP TABLE EMPLOYEES - This option is correct because when you drop a table using the DROP TABLE statement, you can use Flashback Technology to recover the dropped table and its data. By using the FLASHBACK TABLE statement, you can restore the dropped table to a previous point in time.

D. DROP USER SMITH - This option is correct because when you drop a user using the DROP USER statement, you can use Flashback Technology to recover the dropped user and its objects. By using the FLASHBACK DATABASE statement, you can restore the dropped user and its objects to a previous point in time.

Therefore, the correct answer is C. DROP TABLE EMPLOYEES and D. DROP USER SMITH. These options can be flashed back using Flashback Technology.

Your database is in NOARCHIEVELOG mode. After which two operations you should take backup of control file? ( choose two)

  1. Adding a new user to database

  2. Adding a new tablespace to database.

  3. Dropping a table from the database.

  4. Dropping a user from the database.

  5. Dropping a datafile from a tablespace.

Correct Option: B,E

Which is the memory area that is created when a dedicated server process is started, and contains data and information for that server process?

  1. SGA

  2. Streams Pool

  3. PGA

  4. Shared Pool

Correct Option: C

What four data protection components have been enhanced in Oracle database 10g release 2

  1. Flashback

  2. Data guard

  3. ASM

  4. Tivoli data protection

  5. Flash recovery

Correct Option: A,B,C,E

Which is the correct description of the significance of the ORACLE_HOME environment variable?

  1. It specifies the directory containing the oracle managed files

  2. It specifies the directory for database files, if not specified explicitly

  3. It specifies the directory containing the oracle software

  4. It specifies the directory of Optimal Flexible Architecture.

Correct Option: C

Which two statements about recovery manager (RMAN) backup are true?

  1. Online redo log files can be backed up

  2. RMAN backup can be taken only if the database is configured in ARCHIEVELOG mode.

  3. Only used data blocks can be backed up as backup sets

  4. Archived redo log files are backed up.

  5. Only consistent database backed up can be performed.

Correct Option: C,D

You want the user APP_DBA to administer the oracle database from remote machine. APP_DBA is granted SYSDBA privilege to perform administrative task on the database. Which file is used by oracle database server to authenticate APP_DBA?

  1. Control file and password file

  2. Password file

  3. Control file

  4. Listener control file

Correct Option: B

The junior DBA of your organization has accidentally deleted the alert log file. What will you do to create new alert log file?

  1. Create the new text file as ALERT.log

  2. You have to recover the alert log file from the valid backup.

  3. No action required. The file will be created automatically by the instance.

  4. Change the value for the BACKGROUND_DUMP_DEST parameter.

Correct Option: C

Which two statements are true about the role in Oracle Database?

  1. A role can contain both system and object privileges.

  2. A role cannot be assigned external authentication.

  3. A role can be granted to itself.

  4. Roles are owned by the SYS user

  5. Roles can be granted to other roles

Correct Option: A,E

Which three information are to be mandatorily provided while creating a new listener using Enterprise Manager Database Control?

  1. The database services to be registered with the listener

  2. The log file and trace file destination for the listener.

  3. The protocol used by the listener

  4. The server name where the listener runs.

  5. The port used by the listener.

Correct Option: C,D,E
- Hide questions