Oracle 1
Oracle 1
Oracle
10. It is very difficult to grant and manage common privileges needed by different groups
of database users using the roles
a True, b False Ans : False
a) A messagebox can be used only by the system and cannot be used in user application
while an alert can be used in user application also.
b)A alert can be used only by the system and cannot be use din user application while an
messagebox can be used in user application also.
c) An alert requires an response from the userwhile a messagebox just flashes a message
and only requires an acknowledment from the user
d) A message box requires an response from the userwhile a alert just flashes a message
an onlyrequires an acknowledment from the user Ans : C
13. Which of the following is not an reason for the fact that most of the processing is
done at the server ?
a To reduce network traffic. b For application sharing, c To implement business rules
centrally,
d None of the above
Ans : D
16. What is the difference between a LIST BOX and a COMBO BOX ?
a In the list box, the user is restricted to selecting a value from a list but in a combo box
the user can type in value which is not in the list
b A list box is a data entry area while a combo box can be used only for control purposes
c In a combo box, the user is restricted to selecting a value from a list but in a list box the
user can type in a value which is not in the list
d None of the above
Ans : A
18. Why is it better to use an INTEGRITY CONSTRAINT to validate data in a table than
to use a STORED
PROCEDURE ?
a Because an integrity constraint is automatically checked while data is inserted into or
updated in a table while a stored procedure has to be specifically invoked
b Because the stored procedure occupies more space in the database than a integrity
constraint definition
c Because a stored procedure creates more network traffic than a integrity constraint
definition
Ans : A
22. You can prepare for these Oracle employment qualification test multiple choice
questions. People usually get similar questions in the regular oracle placement papers.
Check out the answers given.
23. The system variable that records the select statement that SQL * FORMS most
recently used
to populate a block is
a SYSTEM.LAST_RECORD
b SYSTEM.CURSOR_RECORD
c SYSTEM.CURSOR_FIELD
d SYSTEM.LAST_QUERY
Ans: D
24. Which of the following is TRUE for the ENFORCE KEY field
a ENFORCE KEY field characterstic indicates the source of the value that SQL*FORMS
uses to populate the field
b A field with the ENFORCE KEY characterstic should have the INPUT ALLOWED
charaterstic turned off
a Only 1 is TRUE
b Only 2 is TRUE
c Both 1 and 2 are TRUE
d Both 1 and 2 are FALSE
Ans : A
28. The packaged procedure that makes data in form permanent in the Database is
a Post
b Post form
c Commit form
d None of the above
Ans : C
29. Which of the following is TRUE for the SYSTEM VARIABLE $$date$$
a Can be assigned to a global variable
b Can be assigned to any field only during design time
c Can be assigned to any variable or field during run time
33. Name the two files that are created when you generate a form using Forms 3.0
a FMB & FMX, b FMR & FDX, c INP & FRM, d None of the above
Ans : C
36. All datafiles related to a Tablespace are removed when the Tablespace is dropped
a TRUE
b FALSE
Ans : B
42. Can an Integrity Constraint be enforced on a table if some existing table data does not
satisfy the constraint
a Yes
b No
Ans : B
46. A database trigger doesnot apply to data loaded before the definition of the trigger
a TRUE
b FALSE
Ans : A
48. Which of the following does not affect the size of the SGA
a Database buffer
b Redolog buffer
c Stored procedure
d Shared pool
Ans : C
52. Declare
fvar number := null; svar number := 5
Begin
goto <<>>
if fvar is null then
<<>>
svar := svar + 5
end if;
End;
What will be the value of svar after the execution ?
a Error
b 10
c5
d None of the above
Ans : A
62. Which of the following is not correct about the TABLE datatype ?
a Can contain any no of columns
b Simulates a One-dimensional array of unlimited size
c Column datatype of any Scalar type
d None of the above
Ans : A
67. Declare
a number := 5; b number := null; c number := 10;
Begin
if a > b AND a <> ( Select count(*) from Emp E2 where E1.SAL > E2.SAL ) will
retrieve
a 3500,5000,2500
b 5000,2850
c 2850,5750
d 5000,5750
Ans : A
73. If an UNIQUE KEY constraint on DATE column is created, will it accept the rows
that are inserted with
SYSDATE ?
a Will
b Wont
Ans : B
True/False
Question The data in the database cannot be shared
Correct Answer False
True/False
Question physical design is tailored to a specific DBMS system
Correct Answer True
Person who design and implement tools Tool developers Tool box developers
True/False
Question Availability is often thoutht of as continuity of service, ensuring that
database is available 24 hours a day, 7 days a week
Correct Answer True
True/False
Question The SSL protocol developed by microsoft corporation, is an industry
accepted standard for network transport layer security
Correct Answer False
True/False
True/False
Question The Database administrator cannot grant or revoke privileges to users.
Correct Answer False
True/False
Question To update city_name to bombay following command is used. UPDATE
EMP_TABLE SET CITY='BOMBAY';
True/False
Question A user can grant any object privilege on any object he or she owns to
any other user or role
Correct Answer True
True/False
Question Distinct clause in select command eliminates rows that have exactly
same contents in each column.
Correct Answer True
True/False
Question A relational model relates records by the value that they contain.
Correct Answer True
Question The ICAM studies created lot of graphical methods for defining
Correct Answer Functions , Data structures
True/False
Question To update city_name to bombay following command is used. UPDATE
EMP_TABLE SET CITY='BOMBAY';
Correct Answer True
True/False
Question SQL is low level language
Correct Answer False
True/False
Question Centralised Database Management cannot support multiple users.
Correct Answer False
True/False
Question Unary operator operates only on one operand.
Correct Answer True
Question In a two tier architecture, the software components are distributed over
which two systems
Correct Answer Client , Server
True/False
Question Temporal constraints can be used to limit the value of a particular
attribute to be in a range
Correct Answer False
E-R model widely used conceptual model widely used conceptual model
True/False
Question Codd developed E-R model
Correct Answer False
True/False
Question In Database management system, protection includes against hardware
and Software malfunctions and not against unauthorized access.
Correct Answer False
Your Answer False
True/False
Question In Database management system, protection includes against hardware
and Software malfunctions and not against unauthorized access.
Correct Answer False
Your Answer False
True/False
Question You cannot grant or revoke system privileges to users and roles.
Correct Answer False
Your Answer True
True/False
Question A database may include varieties of data that are interrelated in many
select * from
order by
Views all columns in sorting ording by specified column_name Views all columns
in sorting ording by specified column_name
Select * from View all data from table. View all data from table.
select , from
Views 2 specified column from table Views 2 specified column from table
select * from where Views all column satisfying condition in where clause Views
all column satisfying condition in where clause
True/False
Question The SSL protocol developed by microsoft corporation, is an industry
accepted standard for network transport layer security
Correct Answer False
Your Answer True
Data files Stores the database itself Stores the database itself
Person who design and implement tools Tool developers Tool developers
True/False
Question Encryption alone is sufficient to secure the data.
Correct Answer False
Your Answer False
True/False
Question physical design is tailored to a specific DBMS system
Correct Answer True
Your Answer False
True/False
Question A relational model relates records by the value that they contain.
Correct Answer True
Your Answer True
POSTED BY MINDGRILL AT 5:22 AM 0 COMMENTS LINKS TO THIS POST
LABELS: DATABASE MANAGEMENT SYSTEM
True/False
Question
Encryption alone is sufficient to secure the data.
Correct Answer
False
Your Answer
False
True/False
Question
All views are not updatable.
Correct Answer
True
Your Answer
False
True/False
Question
Logical 'OR' operator returns true if both component conditions are true
otherwise returns false
Correct Answer
False
Your Answer
False
True/False
Question
Structural constraints are specified to force the placement of information into
structures.
Correct Answer
True
Your Answer
True
True/False
Question
Distinct clause in select command eliminates rows that have exactly same
contents in each column.
Correct Answer
True
Your Answer
True
Question
Attributes are classified as :-
Correct Answer
Simple , Composite , Multivalued
Your Answer
Simple , Composite , Multivalued , Variant
Question
Set operators are as follows :-
Correct Answer
UNION , INTERSECT , MINUS
Your Answer
UNION , INTERSECT , MINUS
Question
The ICAM studies created lot of graphical methods for defining :-
Correct Answer
Functions , Data structures
Your Answer
Functions , Combinations , Data structures , Conditions
True/False
Question
The information collected during requirement analysis forms input for
information modeling.
Correct Answer
True
Your Answer
True
Question
Security considerations apply to :-
Correct Answer
Data, database , DBMS , Users and applications
Your Answer
Users and applications , Variant , Data, database , DBMS
Question
Specify any three string functions used in SQL :-
Correct Answer
initcap(char) , upper(char) , lower(char)
Your Answer
lower(char) , initcap(char) , upper(char) , stringlength(char)
select , from
Question
Write the attributes of entity "book" :-
Correct Answer
Book_no , Book_name , Price
Your Answer
Book , Book_no , Book_name , Price
Question
To be able to successfully design and maintain databases we have to do
following :-
Correct Answer
Identify relationship between objects , Identify worlds data is of interest to us ,
Data dictionary
Your Answer
Hardware manipulations , Identify relationship between objects , Identify worlds
data is of interest to us , Data dictionary
True/False
Question
Wait-die scheme is based on preemptive technique.
Correct Answer
False
Your Answer
True
Question
Some clauses of Revoke command are as follows :-
Correct Answer
FROM , ON
Your Answer
FROM , ON , ANY , MANY
Question
Different E-R modeling styles are :-
Correct Answer
Rein 85 , IDEFIX , Crow's foot
Your Answer
Crow's foot , Rein 85 , IDEFIX , Functions
Question
Reasons of creation of views are :-
Correct Answer
When data security is required , When data redundancy is to be kept to
minimum.
Your Answer
When data security is required , When data redundancy is to be kept to
minimum. , To remove or to change all data , When sharing of data is required
Question
The front end of database consists of tools such as :-
Correct Answer
Forms , Query evaluators , Graphical user interfaces
Your Answer
Forms , Query evaluators , Report writers , Graphical user interfaces
Question
What are secured using authorization and access control?
Correct Answer
The intranet , Local clients , Operators
Your Answer
The intranet , Local clients , Operators , The internet
True/False
Question
A fully developed data model includes domains for each attribute in the E-R
model.
Correct Answer
True
Your Answer
True
True/False
Question
If attribute is multi-valued then single lines are used.
Correct Answer
False
Your Answer
True/False
Question
If attribute is derived dotted line is used.
Correct Answer
True
Your Answer
True
POSTED BY MINDGRILL AT 5:20 AM 0 COMMENTS LINKS TO THIS POST
LABELS: DATABASE MANAGEMENT SYSTEM
True/False
Question
Physical design is tailored to a specific DBMS system.
Correct Answer
True
Your Answer
True
Question
In a two tier architecture, the software components are distributed over which
two systems?
Correct Answer
Client , Server
Your Answer
Client , Server
Question
Different syntaxes used for update command in SQL are as follows :-
Correct Answer
update
set = , update
set = where
Your Answer
update from
set =
True/False
Question
Database design model help in improving maintainability.
Correct Answer
True
Your Answer
True
Question
Write examples of dbms :-
Correct Answer
FoxBASE , FoxPro
Your Answer
FoxBASE , FoxPro , Cobol , Pascal
True/False
Question
A fuzzy checkpoint allows transactions to perform updates even while buffer
blocks are being written out.
Correct Answer
True
Your Answer
True
True/False
Question
A program is a collections of instructions for manipulating data.
Question
Deadlock prevention scheme using time stamps are:-
Correct Answer
Wait - die , Wound - wait
Your Answer
Wait - die , Wound - wait , Rollback , Starvation
Question
Specify any 2 forms of insert command :-
Correct Answer
INSERT INTO SELECT , FROM , INSERT INTO SELECT , FROM WHERE
Your Answer
INSERT INTO SELECT , FROM , INSERT INTO SELECT , FROM WHERE
Question
Some clauses of GRANT command are as follows :-
Correct Answer
ALL , ON , PUBLIC
Your Answer
ALL , ON , PUBLIC
Question
Advantages of Database Management System are :-
Correct Answer
Reduced redundancy , Sharing of data , Security
Your Answer
Reduced redundancy , Sharing of data , Security , Work Space required for
execution and storage is less
True/False
Question
The database is partitioned into some number of fixed length block called as
pages.
Correct Answer
True
Your Answer
True
Question
Following are properties of roles allowed for easier privilege management :-
Correct Answer
Application awareness , Reduced privilege administration , Dynamic privilege
administration
Your Answer
Reduced privilege administration , Dynamic privilege administration ,
Application awareness
True/False
Question
Database is widely used in banking.
Correct Answer
True
Your Answer
True
Question
The levels of abstraction of data are :-
Correct Answer
Physical level , Logical level , View level
Your Answer
Physical level , Logical level , View level
True/False
Question
>= ' is arithmetic operator.
Correct Answer
False
Your Answer
False
True/False
Question
DES provides standards based encryption for data privacy.
Correct Answer
True
Question
Block movements between disk and main memory are initiated through two
operations namely :-
Correct Answer
Input , Output
Your Answer
Input , Output
Question
ERD captures :-
Correct Answer
Entity type , Attributes , Relationship between entities
Your Answer
Entity type , Attributes , Relationship between entities
Question
Security considerations apply to
Correct Answer
users and applications , data, database , dbms
Your Answer
data, database , dbms , users and applications
Question
Advantages of Database Management System
Correct Answer
Reduced redundancy , Sharing of data , Security
Your Answer
Reduced redundancy , Sharing of data , Security , Work Space required for
execution and storage is less
Question
Which of the following is a database privilege
Correct Answer
The right to connect the database , The right to create table , The right to select
rows from another user's table
Your Answer
The right to connect the database , The right to create table , System
programming
True/False
Question
You cannot grant or revoke system privileges to users and roles.
Correct Answer
False
Your Answer
False
True/False
Question
Centralised Database Management cannot support multiple users.
Correct Answer
False
Your Answer
False
Question
Different syntaxes used for update command in SQL are as follows.
Correct Answer
update
set = , update
set = where
Your Answer
update
set = where
Question
Some examples of select command are as following using emp_table
Correct Answer
select * from emp; , select empno,name from emp , select empno,name from emp
where salary in(9000,10000);
Your Answer
select * from emp; , select empno,name from emp where salary in(9000,10000);
Question
Strong entities are also called as
Correct Answer
dominant , Parent , owner
Your Answer
dominant , owner
Question
Specify any three string functions used in SQL
Correct Answer
lower(char) , initcap(char) , upper(char)
Your Answer
lower(char) , upper(char) , stringlength(char)
Question
Which of the following is a database privilege
Correct Answer
The right to connect the database , The right to create table , The right to select
rows from another user's table
Your Answer
The right to connect the database , The right to create table , The right to select
rows from another user's table , System programming
True/False
Question
A role provides authorisation.
Correct Answer
True
Your Answer
True
True/False
Question
The SSL protocol developed by microsoft corporation, is an industry accepted
standard for network transport layer security
Correct Answer
False
Your Answer
True
True/False
Question
SQL is low level language
Correct Answer
False
Your Answer
True
True/False
Question
To update city_name to bombay following command is used. UPDATE
EMP_TABLE SET CITY='BOMBAY';
Correct Answer
True
Your Answer
True
True/False
Question
In Database management system, protection includes against hardware and
Software malfunctions and not against unauthorized access.
Correct Answer
False
Your Answer
False
True/False
Question
A role provides authorisation.
Correct Answer
True
True/False
Question
Logical 'OR' operator returns true if both component conditions are true
otherwise returns false
Correct Answer
False
Your Answer
False
Question
Attributes are classified as
Correct Answer
Simple , Composite , Multivalued
Your Answer
Simple , Composite , Multivalued
Question
What are secured using authorisation and access control.
Correct Answer
The intranet , local clients , opearators
Your Answer
The intranet , the internet
Question
Which of the following are object oriented features
Correct Answer
Inheritance , Abstraction
Your Answer
Inheritance , Polymerisation
Question
Three levels of database service
Correct Answer
External level , Conceptual level , Physical level
Your Answer
External level , Conceptual level , Physical level
True/False
Question
Using database redumdancy can be removed
Correct Answer
True
Your Answer
True