Oracle - PLSQL
Oracle - PLSQL
…………………… is a procedural extension of Oracle – SQL that offers language constructs similar to
those in imperative programming languages.
A) SQL
B) PL/SQL
C) Advanced SQL
D) PQL
2. ……………….. combines the data manipulating power of SQL with the data processing power of
Procedural languages.
A) PL/SQL
B) SQL
C) Advanced SQL
D) PQL
3. ………………. has made PL/SQL code run faster without requiring any additional work on the part of the
programmer.
A) SQL Server
B) My SQL
C) Oracle
D) SQL Lite
A) Lexical Units
B) Literals
C) Textual Units
D) Identifiers
B) Literals
C) Delimiters
D) Identifiers
A) Comments
B) Literals
C) Delimiters
D) Identifiers
A) Strong
B) Weak
C) Empty
D) Anonymous
A) Integers literal
B) String literal
C) String units
D) String label
9. In ……………………, the management of the password for the account can be handled outside of oracle
such as operating system.
A) Database Authentication
B) Operating System Authentication
C) Internal Authentication
D) External Authentication
10. In ………………………. of Oracle, the database administrator creates a user account in the database for
each user who needs access.
A) Database Authentication
C) Internal Authentication
D) External Authentication
A) Cursor
B) Trigger
C) Keywords
D) Replace
12. ………………………… is used to define code that is executed / fired when certain actions or event occur.
A) Cursor
B) Trigger
C) Keywords
D) Replace
13. …………….. provide a way for your program to select multiple rows of data from the database and
then process each row individually.
A) PL/SQL Cursors
B) PL/SQL Trigger
C) PL/SQL Select
D) PL/SQL Process
14. ……………………… cursor are declared by ORACLE for each UPDATE, DELETE and INSERT SQL
commands.
A) Implicit
B) Explicit
C) Internal
D) External
15. ……………………. cursors are declared and used by the user to process multiple row, returned by
SELECT statement.
A) Implicit
B) Explicit
C) Internal
D) External
16. ………………….. contain a pointer that keeps track of current row being accessed, which enables your
program to process the rows at a time.
A) Tracker
B) Cursor
C) Accesser
D) Trigger
17. ………………….. a cursor enables you to define the cursor and assign a name to it.
A) Declearing
B) Stating
C) Extracting
D) Importing
18. In ………………. the cursor advances to the next row in the active set each time the fetch command is
executed.
A) recreating process
B) redefining process
C) iterative process
19. A ……………………. is a database object that groups logically related PL/SQL types, objects and
subprograms.
A) Module
B) Package
C) Body
D) Name
A) Public
B) Private
C) Friend
D) Protected
A) Oracle Client
B) Oracle Server
C) Oracle Middle-ware
D) Oracle Instance
22. The ……………………… consists of the memory components of Oracle and various background
processes.
A) Oracle Parameter
B) Oracle Profile
C) Oracle Process
D) Oracle Instance
23. The Oracle Instance is made up of the ………………………. and the background processes.
24. The background processes of the Oracle instance are responsible for performing …………………. I/O
functions.
A) Synchronous
B) Asynchronous
25. The PGA is used to process ………………………… and to hold logon and other session information.
A) SQL Statements
B) Server Processes
C) User Processes
D) Shared Statements
26. In SGA, the contents of the memory area are shared by multiple users is called as …………………..
C) Shared Pool
D) Large Pool
27. In Oracle Database ………………….. Contain the data dictionary and user created data.
A) Data Files
B) Control Files
D) Password Files
28. The ………………………….. keeps a record of the names, size locations different physical files of the
Oracle Database.
A) Data File
B) Control File
D) Password File
29. In Oracle Database, ……………………………… is used to hold the names of privileged users who have
been granted the SYSDBA or SYSOPR roles.
A) Data File
B) Control File
D) Password File
30. In Oracle, the end of the transaction is recorded in the ……………………….. files.
A) Data
B) Control
C) Redo Log
D) Password
31) If the transaction is rolled back, all the database changes made inside the transaction are ……
A. made permanent
B. made temporary
D. undone
A. Atomicity
B. Concurrency
C. Isolation
D. Durability
C. isolation monitor
D. transaction log
A. committed
B. rolled back
C. partially committed
D. Aborted
35) …….. means that a transaction must execute exactly once completely or not at all.
A. durability
B. consistency
C. atomicity
D. isolation
36) Assume transaction A holds a shared lock R. If transaction B also requests for a shared lock on R.
37) ……….. means that when it ends, a transaction must leave the database in a consistent state.
A. Data isolation
B. Data duration
C. Data consistency
D. Data non-reputability
38) The number of transactions executed in a given amount of time is called ………
A. utilization
B. execution rate
C. throughput
D. atomicity
B. Application Programmer
41) …….. means that a transaction must make its changes permanent to the database ends.
A. isolation
B. locking
C. durability
D. consistency
A. isolate transactions
B. transaction recovery
C. system recovery
D. media recovery
44) The part of a database management system which ensures that the data remains in a consistent
state is
A. authorization and integrity manager
B. buffer manager
C. transaction manager
D. file manager
45) ……… protocol is used to perform multiple transactions that execute on a different database.
A. commit
B. two-phase lock
C. two-phase commit
D. locking
46) A transaction can do read and write operation on a data item when it acquires ……
A. read mode
B. exclusive mode
C. shared mode
D. write mode
A. Transaction management
B. Application programmer
C. Concurrency control
D. Recovery management
49) In a dirty read problem …….
50) A transaction can do only read operation and not write operation on a data item when it acquires
……. lock.
A. read mode
B. exclusive mode
C. shared mode
D. write mode
51. ………………….. is the collection of memory structures and Oracle background processes that operates
against an Oracle database.
A) Database
B) Instance
C) Tablespace
D) Segment
A) tablespace
B) segments
C) extents
D) blocks
B) segments
C) extents
D) blocks
54. ……………………….. is a contiguous group of blocks allocated for use as part of a table, index, and so
forth.
A) tablespace
B) segment
C) extent
D) block
A) Database
B) Instance
C) Tablespace
D) Database Block
56. An Oracle ………………………..is a set of tables and views that are used as a read-only reference about
the database.
A) Database dictionary
B) Dictionary table
C) Data dictionary
D) Dictionary
A) Instance
B) Segment
C) Database
D) Dictionary
58. An Oracle object type has two parts the …………………. and …………………….
A) INSTANTIABLE
B) NOT INSTANTIABLE
C) FINAL
D) OVERRIDING
60. A method modifier tells Oracle that new subtypes may not override a method is called …………….
A) INSTANTIABLE
B) NOT INSTANTIABLE
C) FINAL
D) OVERRIDING
61) In the …………, one transaction inserts a row in the table while the other transaction is halfway
through its browsing of the table.
D. maintaining data
A. locking
B. transaction monitor
C. transaction serializability
D. two-phase commit
64) If a transaction acquires a shared lock, then it can perform ………. operation.
A. read
B. write
D. update
65) If a transaction obtains a shared lock on a row, it means that the transaction wants to ….. that row.
A. write
B. insert
C. execute
D. read
66) The node where the distributed transaction originates is called the …….
A. local coordinator
B. starting coordinator
C. global coordinator
D. originating node
67) If a transaction obtains an exclusive lock on a row, it means that the transaction wants to ……. that
row.
A. select
B. update
C. view
D. read
68) If a transaction acquires an exclusive lock, then it can perform ………. operation.
A. read
B. write
D. update
69) …….. is a specific concurrency problem wherein two transactions depend on each other for
something.
C. deadlock
D. locking
70) If a database server is referenced in a distributed transaction, the value of its commit point strength
determines which role it plays in the ………
A. two-phase commit
B. two-phase locking
C. transaction locking
D. checkpoints
71) Transaction ………. ensures that the transaction is being executed successfully.
A. concurrency
B. consistency
C. serializability
D. non serialiasability
72) The situation in which a transaction holds a data item and waits for the release of data item held by
some other transaction, which in turn waits for another transaction, is called …….
A. serializable schedule
B. process waiting
C. concurrency
D. deadlock
A. two-phase locking
B. two-phase commit
C. transaction locking
D. checkpoints
74) The global coordinator forgets about the transaction phase is called ………
A. Prepare phase
B. Commit phase
C. Forget phase
D. Global phase
75) In two-phase commit, ………. coordinates the synchronization of the commit or rollback operations.
A. database manager
B. central coordinator
C. participants
A. shrinking phase
B. growing phase
C. running phase
D. initial phase
A. processing monitor
B. transaction monitor
C. TP monitor
D. monitor
78) After the nodes are prepared, the distributed transaction is said to be ……
A. in-doubt
B. in-prepared
C. prepared transaction
D. in-node
79) In ………., we have many mini transactions within the main transaction.
A. transaction control
B. chained transaction
C. nested transaction
D. calling transaction
A. shrinking phase
B. growing phase
C. running phase
D. initial phase
81) A mechanism which ensures that simultaneous execution of more than one transaction does not
lead to any database inconsistencies is called ……………… mechanism.
A. transaction control
B. transaction management
C. concurrency parallelism
D. concurrency control
82) The transaction wants only to read the data item of the mode is called as …….
A. Exclusive Mode
B. Shared Mode
C. Inclusive Mode
D. Unshared Mode
A. non-serial schedule
B. serial schedule
C. schedule
D. interleaved schedule
84) ………… is a program or set of program that interacts with the database at some point in its
execution.
A. A database system
B. A database application
C. Both
D. none
85) ………. component of a database is responsible for ensuring atomicity and durability.
A. recovery management
B. concurrency control
C. storage management
86) The activity of ensuring atomicity in the presence of Transaction aborts is called ……….
A. transaction control
B. transaction management
C. transaction recovery
D. concurrency control
87) A ………….is a set of rules that state when a transaction may lock or unlock each of the data items in
the database
A. concurrency control
B. transaction control
C. validation control
D. locking protocol
88) ……………… is a collection of programs performing all necessary action associated with a database.
A. Database associated
B. Database administrator
C. Database application
A. Graph-based protocol
A. database control
B. transaction management
C. transaction recovery
D. database recovery
91) Which protocol allows a transaction to lock a new data item only if that transaction has not yet
unlocked data item?
A. Graph-based protocol.
92) ………. is a collection of application programs that interact with the database along with DBMS.
A. A database system
B. A database application
C. Database administration
D. Data system
93) …….. ensures that once the transaction completes successfully, the results of the operations become
permanent.
A. serializability
B. synchronizability
C. atomicity
D. durability
94) A ……. contains information for undoing or redoing all the actions performed by the transactions.
A. save point
B. log
C. node
D. commit_point
95) A …………. is a unit of program execution that accesses and possibly updates various data items.
A. DBMS
B. monitor
C. transaction
D. transistor
96) A transaction is an action used to perform some manipulation on data stored in the ……..
A. Memory
B. Record
C. Database
D. All of these
A. aborted
B. committed
C. running state
D. aborted or committed
98) The two possible communication errors are, Lost messages and …….
A. Network Partitions
B. Lost acknowledgment
C. Timeout
D. log error
99) The only way to undo the effects of a committed transaction is to execute a …….
A. committed transaction
B. compensating transaction
C. supplementary transaction
D. update query
100) In ………., one or more users/programs attempt to access the same data at the same time.
A. concurrency
B. transaction control
C. locking
D. two-phase locking
A. data integrity
B. data consistency
C. data sharing
D. data security
102) The transaction wants to edit the data item is called as …….
A. Exclusive Mode
B. Shared Mode
C. Inclusive Mode
D. Unshared Mode
103) For committing a transaction, the DBMS might discard all the records.
A. after image
B. before image
C. log
D. redo log
104) A sophisticated locking mechanism is known as 2-phase locking which includes Growing phase and
…….
A. Shrinking Phase
B. Release phase
C. Commit phase
D. Acquire Phase
106) In ………., each transaction there is a first phase during which new lock is acquired.
A. Shrinking Phase
B. Release phase
C. Commit phase
D. Growing Phase
B. transaction monitor
C. TP monitor
D. monitor
108) The transactions are always ……… if it always locks a data item in the shared mode before reading
it.
A. well-formed
B. well distributed
C. well locked
D. well shared
A. Data servers
B. Transaction servers
C. Query servers
D. Client servers
110) If a distributed transactions are well-formed and 2-phase locked, then ……………. is the correct
locking mechanism in the distributed transaction as well as in centralized databases.
A. two-phase locking
C. transaction locking
D. well-formed locking
111) ……… property will check whether all the operation of a transaction completed or none.
A. Atomicity
B. Consistency
C. Isolation
D. Durability
112) The total ordering of operations across groups ensures ………..of transactions.
A. serializability
B. synchronizability
C. atomicity
D. durability
113) In which state, the transaction will wait for the final statement has been executed?
A. Active
B. Failed
C. Aborted
D. partially committed
A. ordering mechanism
B. inherent ordering
C. total ordering
D. partial ordering
A. Db_Block_Buffers
B. Processes
C. shared_Pool_size
D. buffers
116) The …………is responsible for ensuring the correct execution in the presence of failures.
A. Database Manager
B. Transaction Manager
C. Recovery Manager
D. Executive Manager
117) A distributed transaction can be …………. if queries are issued at one or more nodes.
A. fully read-only
B. partially read-only
C. fully read-write
D. partially read-write
118) The distributed transaction can be completely read-only and the transaction is started with a ……….
READ ONLY statement.
A. DISTRIBUTED_TRANSACTIONS
B. TRANSACTION
C. SET TRANSACTION
D. READ TRANSACTION
119) The initialization parameter …………….. controls the number of possible distributed transactions in
which a given instance can concurrently participate, both as a client and a server.
A. DISTRIBUTED_TRANSACTIONS
B. TRANSACTION
C. SET TRANSACTION
D. CONTROL TRANSACTION
120) A database administrator can manually force the COMMIT or ROLLBACK of a local …………
distributed transaction.
A. in-force
B. in-doubt
C. in-local
D. in-manual
B. Immediate update
C. Two-phase commit
D. Recovery management
A. Recovery measures
B. Security measures
C. Concurrency measures
D. Authorization measures
A. system recovery
B. media recovery
C. database recovery
D. failure recovery
A. Filter
B. Recovery
C. Security
D. Scalability
A. disk errors
B. hard errors
C. system errors
D. power failures
A. Filter
B. Recovery
C. Security
D. Scalability
A. transaction recovery
B. database recovery
C. system recovery
D. value recovery
128) The ………. consists of the various applications and database that play a role in a backup and
recovery strategy.
129) In which the database can be restored up to the last consistent state after the system failure?
A. Backup
B. Recovery
C. Both
D. None
130) A ……….. is a block of Recovery Manager(RMAN)job commands that is stored in the recovery
catalogue.
A. recovery procedure
B. recovery block
C. stored block
D. stored script
A. filter
B. records
C. blocks
D. numbers
A. set up
B. registration
C. start up
D. enrollment
A. Disk recovery
B. Shadow paging
C. Dish shadowing
D. Crash recovery
134) Most backup and recovery commands in ……….. are executed by server sessions.
A. Backup Manager
B. Recovery Manager
135) …….. systems typically allows to replace failed disks without stopping access to the system.
A. RAM
B. RMAN
C. RAD
D. RAID
136) An ……… is an exact copy of a single data-file, archived redo log file, or control file.
A. image copy
C. copy log
D. control copy
137) ………. known as memory-style error correcting-code(ECC) organization, employs parity bits.
A. RAID level 1
B. RAID level 2
C. RAID level 3
D. RAID level 4
138) The remote backup site is sometimes called the ………. site.
A. primary
B. secondary
C. ternary
D. to create Schedule.
140) The simplest approach to introducing redundancy is to duplicate every disk is called …..
A. mirroring
B. imaging
C. copying